Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android VoIP Upgrade Disaster Recovery Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Chrome Tip of the week Gmail Budget WiFi Apple How To BDR HIPAA Computing Applications Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Managed IT Services 2FA Operating System Router Computers Risk Management Healthcare Virtual Private Network Website Help Desk Health Analytics Office Tips Augmented Reality Storage Retail Password Bring Your Own Device Big Data Social Windows 11 Going Green Patch Management Save Money Excel Customer Service Remote Monitoring Cybercrime End of Support Vulnerability Vendor Management Remote Workers Physical Security Display Printer Monitoring Paperless Office Free Resource Infrastructure Project Management Windows 7 Firewall Microsoft 365 Document Management Telephone Solutions The Internet of Things Cooperation Scam Data loss Telephone System Holidays Cost Management Data Storage Supply Chain Customer Relationship Management Settings Video Conferencing Robot Printing Wireless Managed Services Provider Professional Services Content Filtering Virtual Machines Hacking YouTube Presentation User Tip IT Management Modem Meetings Mobile Security Processor Cryptocurrency VPN Wireless Technology iPhone Virtual Desktop Computer Repair Vulnerabilities Data storage LiFi Smart Technology Data Privacy Word Outlook Saving Time Images 101 Mobility Money Multi-Factor Authentication Managed IT Service Humor Machine Learning Downloads Safety Sports Licensing Mouse Maintenance Employees Integration Entertainment Antivirus Administration Microsoft Excel Surveillance Virtual Assistant Outsource IT Data Analysis Best Practice Star Wars Application Gamification Buisness Tablet Staff Virtual Machine Environment Media Medical IT Legal IT solutions IBM Social Networking Reviews Alert Legislation File Sharing Development Dark Data Transportation Small Businesses Fileless Malware Business Growth Managed IT Content Wearable Technology How To Hypervisor Displays PowerPoint Health IT Motherboard Shopping Cortana Notifications Comparison Optimization Travel Permissions Employer/Employee Relationships Outsourcing Directions Alt Codes Assessment Techology Downtime Competition Google Maps PCI DSS Navigation Workplace Hosted Solution Gig Economy Specifications Unified Threat Management Fraud Internet Service Provider Teamwork Hiring/Firing Microchip Typing Internet Exlporer Unified Threat Management Username Regulations Compliance Evernote Paperless Co-managed IT Google Drive Knowledge User Black Friday Memes Net Neutrality Network Congestion SQL Server Technology Care Database User Error IT Technicians Financial Data 5G History Business Communications Scams Google Docs Proxy Server Unified Communications IP Address Cookies Smartwatch Experience Cyber Monday IT Running Cable Point of Sale Hotspot Procurement Azure Hybrid Work Bitcoin Tactics Google Wallet Mirgation Telework Cyber security Tech Human Resources Communitications Cables Network Management Nanotechnology CES Recovery Tech Support Addiction Laptop Hard Drives Language Supply Chain Management Monitors Windows 8 Term Google Apps Drones Management Domains Chatbots FinTech Distributed Denial of Service IT Assessment IT Maintenance Screen Reader Websites Service Level Agreement Halloween Refrigeration Computing Infrastructure Flexibility Value Business Intelligence Shortcuts SharePoint Public Speaking Identity Organization Electronic Medical Records Smart Devices Ransmoware Bookmark Lithium-ion battery Smart Tech Digital Security Cameras Download Scary Stories Alerts Remote Working Entrepreneur Writing Memory Vendors Hacks Lenovo Google Play Be Proactive Fun Virtual Reality Data Breach Break Fix Electronic Health Records Workforce Browsers Deep Learning Server Management Connectivity Videos Private Cloud Upload Undo Identity Theft Wasting Time Threats Superfish Security Cameras Workplace Strategies Social Network Education Twitter Multi-Factor Security Trend Micro Dark Web Software as a Service Meta IoT Error Trends Social Engineering Managing Costs Amazon Mobile Computing SSID Customer Resource management Regulations Search Remote Computing Google Calendar eCommerce

Blog Archive