Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Disaster Recovery Data Recovery Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office WiFi Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Managed Services Voice over Internet Protocol Gmail Budget How To BDR HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Bring Your Own Device Big Data Managed IT Services Operating System Router Computers Risk Management Virtual Private Network 2FA Website Health Help Desk Analytics Office Tips Augmented Reality Healthcare Retail Storage Password The Internet of Things Scam Data loss Cooperation Free Resource Project Management Windows 7 Social Microsoft 365 Going Green Patch Management Save Money Solutions Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Physical Security Display Printer Windows 11 Paperless Office Monitoring Infrastructure Excel Firewall Document Management Remote Workers Telephone Mouse Vulnerabilities Entertainment Data Privacy Administration Images 101 Mobility Telephone System Multi-Factor Authentication Cost Management Robot Customer Relationship Management Settings Wireless Printing Content Filtering Employees Integration Hacking IT Management YouTube Meetings Presentation VPN Modem User Tip Processor Mobile Security Cryptocurrency Wireless Technology Holidays Computer Repair Virtual Desktop Data Storage Data storage Smart Technology Supply Chain LiFi Video Conferencing Word Managed Services Provider Virtual Machines Outlook Professional Services Saving Time Machine Learning Money Humor Managed IT Service Downloads Safety iPhone Maintenance Sports Licensing Antivirus Multi-Factor Security Tech Human Resources Education Social Engineering Social Network Telework Cyber security IoT Communitications Dark Web Cables Remote Computing CES Trends Supply Chain Management Mobile Computing Google Calendar Term Google Apps Tablet Search Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Application Best Practice Alert Data Analysis Buisness File Sharing Dark Data Gamification Flexibility Staff Value Business Intelligence Managed IT IBM Legal Legislation Shortcuts IT solutions How To Organization Social Networking Smart Devices Ransmoware Business Growth Notifications Fileless Malware Digital Security Cameras Travel Content Remote Working Wearable Technology Memory Vendors Techology Comparison Google Play Be Proactive Google Maps Cortana Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Alt Codes Directions Videos Downtime Unified Threat Management Wasting Time Threats Competition Unified Threat Management Specifications Security Cameras Workplace Strategies Hosted Solution Trend Micro Microchip Internet Exlporer Software as a Service Fraud Meta Typing Network Congestion Username Managing Costs Amazon eCommerce Google Drive User Error Black Friday SSID User Knowledge Database Surveillance Virtual Assistant Outsource IT Media Point of Sale 5G IT Technicians Virtual Machine Environment Cookies IP Address Google Docs Cyber Monday Medical IT Unified Communications Experience Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Bitcoin Network Management Running Cable Tech Support Monitors Mirgation Hypervisor Displays Google Wallet Nanotechnology Optimization PowerPoint Recovery Shopping Addiction Language Employer/Employee Relationships Outsourcing Hard Drives Windows 8 Laptop Websites Navigation Management PCI DSS Chatbots Domains Drones Screen Reader SharePoint Distributed Denial of Service Workplace Electronic Medical Records Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Refrigeration Halloween Public Speaking Lenovo Evernote Paperless Writing Regulations Compliance Identity Smart Tech Memes Lithium-ion battery Co-managed IT Virtual Reality Bookmark Entrepreneur Scary Stories Private Cloud Download Net Neutrality Alerts SQL Server Technology Care Hacks Server Management Superfish Business Communications Identity Theft Fun Financial Data History Connectivity IT Break Fix Scams Deep Learning Twitter Browsers Smartwatch Error Upload Procurement Azure Hybrid Work Undo

Blog Archive