Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Cybersecurity Saving Money Communication Productivity Smartphone Data Backup Managed Service Android Upgrade AI Business Management VoIP Smartphones communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Information Facebook Automation Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Blockchain Bandwidth Business Technology Virtualization Data Security Two-factor Authentication Mobile Office Vendor Apps BYOD Mobile Device Management Chrome Gmail Budget Managed Services Apple Tip of the week Voice over Internet Protocol App Employer-Employee Relationship Networking How To Conferencing Computing Hacker BDR Information Technology Avoiding Downtime Marketing Office 365 HIPAA Access Control WiFi Applications Computers Risk Management Website Analytics Office Tips Augmented Reality Virtual Private Network 2FA Storage Health Password Router Bring Your Own Device Big Data Healthcare Retail Help Desk Operating System Managed IT Services Microsoft 365 Telephone Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cooperation Physical Security Windows 11 Firewall Display Printer Paperless Office Excel Infrastructure The Internet of Things Remote Workers Social Document Management Monitoring Going Green Scam Free Resource Project Management Data loss Windows 7 Customer Service Cybercrime Multi-Factor Authentication YouTube Mobility Presentation Managed IT Service Cryptocurrency Downloads Wireless Technology Robot Licensing Virtual Desktop Employees Data storage LiFi Integration Entertainment IT Management Word Outlook VPN Meetings Holidays Telephone System Money Cost Management Humor Computer Repair Data Storage Supply Chain Video Conferencing Safety Managed Services Provider Sports Mouse Virtual Machines Professional Services Administration Machine Learning User Tip Modem Mobile Security Processor iPhone Maintenance Smart Technology Antivirus Vulnerabilities Customer Relationship Management Data Privacy Settings Wireless Printing Images 101 Content Filtering Saving Time Hacking Shortcuts Alert Identity Organization User Smart Tech Digital Security Cameras Google Drive Smart Devices Managed IT Ransmoware File Sharing Knowledge Bookmark Dark Data How To Download Alerts Remote Working Vendors Memory Data Breach Be Proactive Google Play Notifications 5G Connectivity Videos Google Docs Break Fix Electronic Health Records Unified Communications Workforce Travel Experience IP Address Browsers Upload Techology Bitcoin Threats Wasting Time Google Maps Running Cable Multi-Factor Security Trend Micro Workplace Strategies Security Cameras Social Network Google Wallet Recovery IoT Dark Web Software as a Service Meta Unified Threat Management Hard Drives Trends Unified Threat Management Windows 8 Amazon Managing Costs Laptop Google Calendar eCommerce SSID Domains Customer Resource management Regulations Drones Star Wars Microsoft Excel Surveillance Outsource IT Virtual Assistant Data Analysis Network Congestion Media Refrigeration Gamification Staff User Error Environment Virtual Machine Halloween Legislation Medical IT Public Speaking Social Networking Reviews Development Small Businesses Transportation Point of Sale Lithium-ion battery Fileless Malware Content Entrepreneur Wearable Technology Hacks Displays Hypervisor Scary Stories Comparison Optimization Network Management PowerPoint Tech Support Fun Health IT Motherboard Shopping Assessment Permissions Deep Learning Outsourcing Employer/Employee Relationships Directions Monitors Navigation Undo PCI DSS Specifications Education Workplace Websites Gig Economy Internet Exlporer Fraud Internet Service Provider Hiring/Firing Teamwork Microchip Paperless Evernote Electronic Medical Records Username Regulations Compliance SharePoint Mobile Computing Black Friday Memes Co-managed IT Search Writing Application Database Net Neutrality Lenovo Best Practice Technology Care SQL Server History Buisness Business Communications Virtual Reality IT Technicians Financial Data Smartwatch Legal Cyber Monday IT Server Management IT solutions Scams Private Cloud IBM Proxy Server Cookies Tactics Hotspot Procurement Superfish Business Growth Hybrid Work Azure Identity Theft Cyber security Human Resources Tech Twitter Mirgation Telework Nanotechnology CES Communitications Cables Error Cortana Social Engineering Addiction Language Supply Chain Management Alt Codes Downtime Google Apps Term Remote Computing Competition Management Chatbots FinTech Screen Reader Distributed Denial of Service IT Assessment Hosted Solution IT Maintenance Service Level Agreement Computing Infrastructure Flexibility Typing Business Intelligence Value Tablet

Blog Archive