Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Automation Facebook Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Business Technology Virtualization Bandwidth Vendor Mobile Office Two-factor Authentication Apps Data Security Apple BYOD App Mobile Device Management Gmail Tip of the week Managed Services WiFi Voice over Internet Protocol Employer-Employee Relationship Chrome Networking Budget Hacker Avoiding Downtime HIPAA Marketing Applications Access Control Computing Information Technology Conferencing Office 365 How To BDR Computers Bring Your Own Device Website Router Physical Security Virtual Private Network 2FA Operating System Health Help Desk Risk Management Retail Big Data Healthcare Analytics Office Tips Augmented Reality Managed IT Services Storage Password Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Going Green Display Printer Windows 11 Firewall Paperless Office Infrastructure Cybercrime Monitoring Excel The Internet of Things Document Management Remote Workers Social Telephone Scam Data loss Free Resource Project Management Cooperation Windows 7 Customer Service Microsoft 365 Presentation Telephone System Mouse Robot Cost Management Wireless Technology Administration Employees Integration IT Management VPN Meetings User Tip Word Modem Computer Repair Mobile Security Settings Holidays Processor Printing Wireless Data Storage Content Filtering Supply Chain YouTube Video Conferencing Smart Technology Managed Services Provider Cryptocurrency Safety Virtual Machines Professional Services Machine Learning Saving Time Virtual Desktop LiFi Managed IT Service Data storage Maintenance iPhone Antivirus Downloads Outlook Licensing Vulnerabilities Data Privacy Money Customer Relationship Management Entertainment Humor Images 101 Multi-Factor Authentication Mobility Sports Hacking Remote Working Memory Vendors Travel Social Networking Education Legislation Data Breach Techology Fileless Malware User Google Play Be Proactive Google Maps Workforce Content Mobile Computing Wearable Technology Videos Electronic Health Records Search Wasting Time Threats Health IT Unified Threat Management Motherboard Comparison Best Practice Permissions IP Address Trend Micro Unified Threat Management Directions Security Cameras Workplace Strategies Assessment Meta Buisness Software as a Service Managing Costs Amazon Legal IT solutions Network Congestion Specifications Internet Exlporer Business Growth Fraud eCommerce User Error Microchip Recovery SSID Hard Drives Virtual Assistant Outsource IT Username Surveillance Black Friday Cortana Domains Virtual Machine Environment Media Point of Sale Database Alt Codes Reviews Medical IT Refrigeration Transportation Small Businesses Network Management Tech Support IT Technicians Downtime Development Monitors Cyber Monday Public Speaking Hypervisor Displays Proxy Server Cookies Hosted Solution Tactics Typing Hotspot Shopping Lithium-ion battery Optimization PowerPoint Employer/Employee Relationships Outsourcing Entrepreneur Websites Mirgation PCI DSS Knowledge Navigation Google Drive Nanotechnology Addiction Electronic Medical Records Language Gig Economy SharePoint Workplace 5G Undo Teamwork Hiring/Firing Management Chatbots Internet Service Provider Unified Communications Writing Distributed Denial of Service Regulations Compliance Experience Lenovo Evernote Paperless Google Docs Screen Reader Service Level Agreement Bitcoin Virtual Reality Computing Infrastructure Running Cable Memes Co-managed IT SQL Server Technology Care Server Management Google Wallet Private Cloud Identity Net Neutrality Financial Data History Superfish Bookmark Business Communications Identity Theft Smart Tech Download Windows 8 Twitter Alerts Smartwatch Laptop IT Application Scams Azure Hybrid Work Drones Error Procurement Social Engineering Break Fix Telework IBM Cyber security Browsers Tech Human Resources Connectivity Upload Remote Computing CES Halloween Communitications Cables Social Network Multi-Factor Security Supply Chain Management Dark Web FinTech Term Google Apps Tablet IoT Trends Hacks Alert Scary Stories IT Assessment IT Maintenance Flexibility Fun Competition Value Business Intelligence Managed IT Customer Resource management File Sharing Regulations Dark Data Google Calendar Deep Learning How To Microsoft Excel Organization Data Analysis Shortcuts Star Wars Ransmoware Gamification Notifications Staff Digital Security Cameras Smart Devices

Blog Archive