Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Facebook Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps App BYOD Mobile Device Management Gmail Managed Services Tip of the week Voice over Internet Protocol WiFi Chrome Budget Employer-Employee Relationship Networking Apple BDR Hacker Avoiding Downtime HIPAA Marketing Computing Applications Information Technology Access Control Office 365 Conferencing How To Computers Website Router Operating System Physical Security Virtual Private Network 2FA Risk Management Health Help Desk Analytics Office Tips Big Data Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Patch Management Solutions Save Money Remote Monitoring Going Green End of Support Vulnerability Vendor Management Cybercrime Windows 11 Display Printer Firewall Paperless Office Infrastructure Excel Monitoring The Internet of Things Remote Workers Document Management Social Telephone Scam Free Resource Project Management Data loss Windows 7 Customer Service Cooperation Microsoft 365 Presentation Robot Telephone System Wireless Technology Cost Management Employees Integration Settings Wireless IT Management Printing Meetings Content Filtering VPN Word Holidays YouTube Modem User Tip Processor Cryptocurrency Computer Repair Mobile Security Data Storage Supply Chain Video Conferencing Managed Services Provider Virtual Desktop Virtual Machines Safety Professional Services Data storage LiFi Smart Technology Machine Learning Outlook Saving Time iPhone Money Humor Managed IT Service Maintenance Downloads Antivirus Vulnerabilities Data Privacy Customer Relationship Management Licensing Sports Images 101 Mouse Entertainment Multi-Factor Authentication Mobility Administration Hacking Data Analysis Memory Vendors Star Wars Best Practice How To Microsoft Excel Remote Working Data Breach Gamification Google Play Be Proactive User Notifications Staff Buisness Travel Social Networking IT solutions Legislation Videos Electronic Health Records Workforce Legal Techology Fileless Malware Wasting Time Threats Google Maps Business Growth Trend Micro IP Address Content Security Cameras Workplace Strategies Wearable Technology Unified Threat Management Motherboard Comparison Cortana Software as a Service Health IT Meta Unified Threat Management Directions Managing Costs Amazon Assessment Alt Codes Permissions eCommerce SSID Recovery Downtime Hosted Solution Network Congestion Specifications Surveillance Virtual Assistant Outsource IT Hard Drives User Error Microchip Virtual Machine Environment Domains Internet Exlporer Media Typing Fraud Reviews Username Medical IT Refrigeration Google Drive Point of Sale Black Friday Knowledge Development Transportation Small Businesses Hypervisor Displays Public Speaking Database Shopping 5G Optimization Lithium-ion battery Network Management PowerPoint Tech Support IT Technicians Google Docs Cookies Entrepreneur Unified Communications Monitors Cyber Monday Experience Proxy Server Employer/Employee Relationships Outsourcing Tactics Navigation Bitcoin Hotspot Running Cable PCI DSS Gig Economy Workplace Google Wallet Websites Mirgation Undo Nanotechnology Internet Service Provider Teamwork Hiring/Firing SharePoint Addiction Evernote Paperless Windows 8 Electronic Medical Records Language Laptop Regulations Compliance Memes Management Co-managed IT Drones Chatbots Screen Reader Writing Distributed Denial of Service Net Neutrality Lenovo SQL Server Technology Care History Service Level Agreement Business Communications Virtual Reality Computing Infrastructure Halloween Financial Data Smartwatch IT Server Management Scams Application Private Cloud Identity Identity Theft Smart Tech Procurement Superfish Bookmark Azure Hybrid Work Cyber security IBM Download Tech Human Resources Hacks Twitter Alerts Scary Stories Telework CES Fun Communitications Cables Error Connectivity Deep Learning Social Engineering Break Fix Supply Chain Management Browsers Upload Term Google Apps Remote Computing FinTech Education Multi-Factor Security IT Assessment Social Network IT Maintenance Competition Tablet IoT Dark Web Flexibility Value Business Intelligence Organization Trends Shortcuts Mobile Computing Alert Dark Data Google Calendar Digital Security Cameras Search Smart Devices Managed IT Customer Resource management Ransmoware File Sharing Regulations

Blog Archive