Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Communication Productivity Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones AI VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Facebook Artificial Intelligence Information Automation Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Virtualization Bandwidth Blockchain Windows 10 Business Technology Vendor Two-factor Authentication Apps Data Security Mobile Office Gmail Tip of the week Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship Chrome Budget BYOD Apple Mobile Device Management App Applications Computing WiFi Information Technology How To Office 365 BDR Conferencing Hacker Avoiding Downtime Marketing Access Control HIPAA Router Operating System 2FA Retail Big Data Risk Management Help Desk Healthcare Managed IT Services Analytics Office Tips Augmented Reality Computers Storage Password Bring Your Own Device Website Virtual Private Network Health Windows 11 Document Management Cybercrime The Internet of Things Excel Remote Workers Monitoring Scam Social Data loss Free Resource Project Management Windows 7 Customer Service Patch Management Telephone Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Vendor Management Solutions Cooperation Physical Security Display Printer Paperless Office Infrastructure Firewall Going Green Data Storage Settings Printing Machine Learning Wireless Content Filtering Safety Video Conferencing Supply Chain User Tip Managed Services Provider Modem Mobile Security Processor YouTube Virtual Machines Professional Services Cryptocurrency Maintenance Antivirus Smart Technology iPhone Virtual Desktop LiFi Data storage Saving Time Vulnerabilities Customer Relationship Management Outlook Managed IT Service Robot Data Privacy Money Images 101 Downloads Hacking Humor Presentation Multi-Factor Authentication Mobility Licensing Wireless Technology IT Management Entertainment Sports Mouse VPN Meetings Employees Integration Administration Telephone System Computer Repair Word Cost Management Holidays SharePoint Entrepreneur Alt Codes Hypervisor Electronic Medical Records Specifications Fraud Small Businesses Shopping Microchip Downtime Optimization Internet Exlporer PowerPoint Username Employer/Employee Relationships Writing Displays Lenovo Hosted Solution Typing PCI DSS Virtual Reality Navigation Black Friday Undo Outsourcing Gig Economy Server Management Private Cloud Database Identity Theft Knowledge Teamwork IT Technicians Google Drive Superfish Internet Service Provider Workplace Regulations Compliance Proxy Server Twitter Cookies Evernote Cyber Monday Hotspot Hiring/Firing Memes Error Tactics 5G Unified Communications Net Neutrality Experience SQL Server Social Engineering Mirgation Application Google Docs Paperless Co-managed IT Bitcoin Financial Data Running Cable History Remote Computing Nanotechnology Language IBM Technology Care Google Wallet Smartwatch IT Addiction Procurement Tablet Management Azure Chatbots Business Communications Scams Windows 8 Telework Laptop Cyber security Alert Screen Reader Tech Distributed Denial of Service Dark Data Computing Infrastructure Hybrid Work Drones CES Managed IT Communitications File Sharing Service Level Agreement Supply Chain Management How To Identity Human Resources Cables FinTech Bookmark Halloween Notifications Smart Tech Term Competition Alerts IT Assessment Travel Download Flexibility Google Maps Value Techology Google Apps IT Maintenance Hacks Organization Browsers Scary Stories Connectivity Break Fix Fun Business Intelligence User Digital Security Cameras Smart Devices Unified Threat Management Upload Deep Learning Remote Working Social Network Memory Multi-Factor Security Unified Threat Management Shortcuts Ransmoware Data Breach IoT Google Play Dark Web Network Congestion IP Address Vendors Videos Education Electronic Health Records Trends Customer Resource management Wasting Time Regulations Google Calendar User Error Be Proactive Workforce Mobile Computing Data Analysis Trend Micro Star Wars Security Cameras Microsoft Excel Search Staff Threats Recovery Software as a Service Point of Sale Gamification Best Practice Managing Costs Social Networking Legislation Hard Drives Workplace Strategies Domains Meta Network Management Fileless Malware Buisness eCommerce Tech Support SSID Content Virtual Assistant Monitors Wearable Technology Amazon Legal IT solutions Surveillance Business Growth Health IT Virtual Machine Motherboard Comparison Refrigeration Permissions Public Speaking Outsource IT Reviews Directions Websites Assessment Medical IT Cortana Transportation Lithium-ion battery Environment Media Development

Blog Archive