Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade VoIP AI Business Management Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Automation Facebook Information Artificial Intelligence Covid-19 Miscellaneous Cloud Computing Gadgets Holiday Training Server Remote Work Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Windows 10 Office Data Management Government Business Continuity Business Technology Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Mobile Office Two-factor Authentication Data Security Vendor Apps Apple Tip of the week App Mobile Device Management Networking Gmail Managed Services Voice over Internet Protocol Chrome BYOD Budget Employer-Employee Relationship Access Control Hacker Conferencing Avoiding Downtime Marketing Computing Information Technology How To BDR Office 365 HIPAA WiFi Applications Health Computers 2FA Website Retail Operating System Managed IT Services Risk Management Analytics Office Tips Router Big Data Augmented Reality Healthcare Storage Virtual Private Network Password Bring Your Own Device Help Desk Customer Service Windows 7 Paperless Office Infrastructure Windows 11 Microsoft 365 Solutions Document Management Going Green Telephone Excel Cybercrime Cooperation Scam Data loss Firewall The Internet of Things Patch Management Save Money Remote Monitoring Vulnerability Remote Workers End of Support Vendor Management Social Physical Security Display Monitoring Free Resource Printer Project Management Images 101 Administration Hacking Mobility Saving Time Multi-Factor Authentication Presentation Supply Chain Managed IT Service Machine Learning Wireless Technology Downloads Employees Settings Wireless Licensing Integration Printing Maintenance Content Filtering Word Antivirus Entertainment YouTube Cryptocurrency Holidays Telephone System Data Storage Cost Management Virtual Desktop Video Conferencing Safety Data Privacy Data storage LiFi Managed Services Provider Professional Services Robot Virtual Machines Outlook Money IT Management Humor User Tip Modem Mobile Security iPhone VPN Meetings Processor Customer Relationship Management Vulnerabilities Sports Computer Repair Mouse Smart Technology Addiction IT Assessment Outsource IT Language Mobile Computing Monitors Management Flexibility Search Environment Chatbots Value Media Distributed Denial of Service Websites Best Practice Organization Screen Reader Service Level Agreement Smart Devices Small Businesses Computing Infrastructure User Digital Security Cameras Buisness Electronic Medical Records IT solutions Remote Working Displays Identity Memory SharePoint Legal Google Play Business Growth Bookmark Smart Tech Data Breach Download Electronic Health Records IP Address Outsourcing Alerts Lenovo Videos Writing Virtual Reality Cortana Wasting Time Workplace Break Fix Security Cameras Server Management Private Cloud Alt Codes Browsers Connectivity Trend Micro Downtime Upload Software as a Service Hiring/Firing Recovery Superfish Identity Theft Twitter Hosted Solution Social Network Managing Costs Hard Drives Paperless Multi-Factor Security Co-managed IT Dark Web SSID Error Typing IoT eCommerce Domains Social Engineering Trends Surveillance Technology Care Virtual Assistant Google Drive Remote Computing Customer Resource management Knowledge Regulations Virtual Machine Refrigeration Business Communications Google Calendar Scams Microsoft Excel Medical IT Data Analysis Reviews Star Wars Public Speaking Gamification Development Lithium-ion battery 5G Hybrid Work Staff Transportation Tablet Google Docs Alert Unified Communications Experience Social Networking Hypervisor Human Resources Legislation Entrepreneur Cables PowerPoint Managed IT File Sharing Bitcoin Fileless Malware Shopping Dark Data Running Cable Optimization How To Content Wearable Technology Employer/Employee Relationships Google Wallet Notifications Health IT PCI DSS Motherboard Undo Google Apps Comparison Navigation IT Maintenance Permissions Travel Windows 8 Directions Gig Economy Laptop Assessment Internet Service Provider Business Intelligence Teamwork Techology Google Maps Drones Regulations Compliance Shortcuts Specifications Evernote Memes Ransmoware Fraud Unified Threat Management Microchip Halloween Internet Exlporer Username Net Neutrality Vendors SQL Server Application Unified Threat Management Financial Data History Be Proactive Black Friday IT IBM Workforce Hacks Smartwatch Network Congestion Scary Stories Database Procurement Fun Threats IT Technicians Azure User Error Tech Deep Learning Proxy Server Telework Cookies Cyber security Workplace Strategies Cyber Monday Tactics Communitications Meta Hotspot Point of Sale CES Education Supply Chain Management Amazon Mirgation Term Network Management Tech Support FinTech Nanotechnology Competition

Blog Archive