Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Communication Productivity Saving Money Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Automation Information Artificial Intelligence Holiday Training Miscellaneous Gadgets Covid-19 Cloud Computing Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Virtualization Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Apps Two-factor Authentication Vendor Data Security Mobile Office Gmail App Tip of the week Employer-Employee Relationship Chrome Networking Budget Mobile Device Management Apple Managed Services BYOD Voice over Internet Protocol WiFi Access Control Computing Information Technology HIPAA Office 365 Applications Hacker How To Avoiding Downtime BDR Marketing Conferencing Healthcare Virtual Private Network Operating System Health Big Data Risk Management Retail Router Analytics Office Tips Computers Augmented Reality Managed IT Services Storage Website Help Desk Password Bring Your Own Device 2FA Physical Security Excel Telephone Going Green Display The Internet of Things Printer Paperless Office Cooperation Free Resource Infrastructure Project Management Cybercrime Social Windows 7 Microsoft 365 Document Management Solutions Customer Service Scam Data loss Monitoring Patch Management Save Money Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Firewall Remote Workers VPN Meetings Downloads iPhone Safety Licensing Computer Repair Settings Entertainment Wireless Vulnerabilities Printing Content Filtering YouTube Images 101 Multi-Factor Authentication Mobility Cryptocurrency Telephone System Cost Management Machine Learning Data Privacy Customer Relationship Management Virtual Desktop Data storage LiFi Employees Maintenance Hacking Antivirus Integration Outlook Presentation Modem User Tip Processor Mobile Security Money Humor Wireless Technology Holidays Data Storage Smart Technology Sports Video Conferencing Mouse Robot Managed Services Provider Word Saving Time Virtual Machines Professional Services Administration IT Management Supply Chain Managed IT Service IT solutions Entrepreneur Download Net Neutrality Outsourcing Alerts SQL Server Legal Network Congestion History Business Growth User Error Financial Data Browsers Smartwatch Connectivity IT Workplace Break Fix Undo Cortana Upload Procurement Point of Sale Hiring/Firing Azure Cyber security Paperless Multi-Factor Security Tech Alt Codes Social Network Telework Downtime CES Network Management IoT Communitications Tech Support Co-managed IT Dark Web Monitors Hosted Solution Trends Supply Chain Management Technology Care FinTech Regulations Business Communications Google Calendar Term Typing Customer Resource management Application Data Analysis Star Wars IT Assessment Websites Scams Microsoft Excel Value Google Drive Knowledge Gamification Flexibility Hybrid Work Staff Organization Social Networking Electronic Medical Records Human Resources Legislation IBM SharePoint Fileless Malware 5G Digital Security Cameras Smart Devices Cables Memory Google Docs Writing Unified Communications Experience Lenovo Content Remote Working Wearable Technology Motherboard Data Breach Virtual Reality Google Apps Comparison Google Play Bitcoin Running Cable Health IT Directions Videos Server Management Assessment Electronic Health Records Private Cloud IT Maintenance Permissions Google Wallet Wasting Time Competition Superfish Identity Theft Business Intelligence Trend Micro Twitter Shortcuts Specifications Security Cameras Windows 8 Laptop Microchip Internet Exlporer Software as a Service Error Ransmoware Fraud Drones Managing Costs Social Engineering Username Vendors eCommerce Remote Computing Be Proactive Black Friday SSID Halloween User Database Surveillance Workforce Virtual Assistant Virtual Machine Tablet Threats IT Technicians Proxy Server Reviews Cookies Alert Workplace Strategies Cyber Monday Medical IT Hacks IP Address Scary Stories Fun Managed IT Tactics Development File Sharing Meta Hotspot Transportation Dark Data Amazon Mirgation Hypervisor How To Deep Learning Recovery Shopping Nanotechnology Optimization Notifications PowerPoint Education Hard Drives Addiction Travel Outsource IT Language Employer/Employee Relationships Environment Chatbots Media Navigation Domains Techology Management PCI DSS Google Maps Gig Economy Screen Reader Distributed Denial of Service Mobile Computing Refrigeration Search Service Level Agreement Internet Service Provider Unified Threat Management Small Businesses Computing Infrastructure Teamwork Displays Identity Evernote Best Practice Public Speaking Unified Threat Management Regulations Compliance Bookmark Smart Tech Memes Lithium-ion battery Buisness

Blog Archive