Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI Business Management VoIP Smartphones Mobile Devices Data Recovery communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Information Facebook Automation Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Windows 10 Blockchain Bandwidth Business Technology Virtualization Wi-Fi Data Security Two-factor Authentication Mobile Office Vendor Apps BYOD Mobile Device Management Chrome Gmail Budget Apple Tip of the week Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking BDR Information Technology Avoiding Downtime Marketing Office 365 Access Control HIPAA WiFi Applications Computing How To Conferencing Hacker Risk Management Website Analytics Office Tips Augmented Reality Virtual Private Network Storage Password Health Router Bring Your Own Device Big Data 2FA Retail Help Desk Healthcare Operating System Managed IT Services Computers Windows 7 Telephone Patch Management Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management Cooperation Physical Security Firewall Display Printer Paperless Office Infrastructure The Internet of Things Windows 11 Document Management Social Excel Remote Workers Going Green Monitoring Scam Data loss Customer Service Cybercrime Free Resource Project Management Cryptocurrency Images 101 Wireless Technology Downloads Mobility Robot Data Privacy Multi-Factor Authentication Licensing Virtual Desktop Entertainment LiFi Data storage Word IT Management Outlook VPN Meetings Employees Integration Money Telephone System Humor Cost Management Computer Repair Holidays Safety Sports Data Storage Mouse Video Conferencing Administration Machine Learning Modem Managed Services Provider User Tip Virtual Machines Processor Professional Services Mobile Security Supply Chain Maintenance Customer Relationship Management Smart Technology Antivirus iPhone Settings Wireless Printing Saving Time Content Filtering Vulnerabilities Hacking Presentation YouTube Managed IT Service IT Assessment Human Resources Download How To Alerts Notifications 5G Flexibility Cables Value Browsers Unified Communications Travel IP Address Connectivity Experience Break Fix Organization Google Docs Digital Security Cameras Smart Devices Techology Google Apps Bitcoin Google Maps Upload Running Cable Multi-Factor Security Remote Working IT Maintenance Google Wallet Memory Social Network Data Breach Google Play Unified Threat Management IoT Recovery Dark Web Business Intelligence Videos Electronic Health Records Unified Threat Management Shortcuts Windows 8 Trends Laptop Hard Drives Domains Regulations Google Calendar Ransmoware Drones Wasting Time Customer Resource management Trend Micro Data Analysis Security Cameras Star Wars Network Congestion Microsoft Excel Vendors Software as a Service User Error Be Proactive Gamification Halloween Refrigeration Staff Public Speaking Social Networking Legislation Workforce Managing Costs eCommerce Fileless Malware SSID Point of Sale Lithium-ion battery Threats Entrepreneur Surveillance Workplace Strategies Hacks Virtual Assistant Content Scary Stories Wearable Technology Tech Support Motherboard Fun Comparison Meta Virtual Machine Network Management Health IT Directions Deep Learning Medical IT Assessment Monitors Permissions Reviews Amazon Development Transportation Undo Education Websites Specifications Outsource IT Hypervisor Environment Optimization Microchip Media PowerPoint Internet Exlporer Fraud Shopping SharePoint Mobile Computing Employer/Employee Relationships Username Electronic Medical Records Navigation Search Black Friday PCI DSS Small Businesses Displays Lenovo Best Practice Database Writing Application Gig Economy Internet Service Provider Teamwork Buisness Virtual Reality IT Technicians IT solutions Evernote Private Cloud IBM Cookies Cyber Monday Regulations Compliance Outsourcing Legal Server Management Proxy Server Memes Superfish Business Growth Identity Theft Tactics Hotspot Net Neutrality Workplace SQL Server Twitter Mirgation Error Nanotechnology Cortana Financial Data Hiring/Firing History IT Paperless Alt Codes Addiction Social Engineering Language Smartwatch Competition Chatbots Procurement Co-managed IT Azure Management Downtime Remote Computing Hosted Solution Tech Screen Reader Distributed Denial of Service Telework Technology Care Cyber security Communitications Business Communications Typing Tablet Service Level Agreement Computing Infrastructure CES Alert Identity Supply Chain Management Scams Managed IT Bookmark Term File Sharing Smart Tech Knowledge Dark Data User FinTech Hybrid Work Google Drive

Blog Archive