Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google IT Services Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android AI Disaster Recovery Data Recovery Upgrade Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Facebook Holiday Artificial Intelligence Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Remote Work Server Compliance Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Windows 10 Blockchain Virtualization Bandwidth Business Technology Wi-Fi Two-factor Authentication Vendor Apps Mobile Office Data Security Gmail BYOD WiFi Chrome Budget Employer-Employee Relationship Tip of the week Apple Managed Services Voice over Internet Protocol App Networking Mobile Device Management HIPAA Office 365 Applications Access Control Conferencing Hacker Avoiding Downtime How To Marketing BDR Computing Information Technology Router Analytics Office Tips Virtual Private Network Augmented Reality Big Data Health Storage Password 2FA Help Desk Bring Your Own Device Retail Computers Healthcare Managed IT Services Operating System Website Risk Management Firewall Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Solutions Physical Security The Internet of Things Display Printer Social Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Customer Service Remote Workers Scam Going Green Data loss Telephone Cybercrime Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Telephone System Multi-Factor Authentication Mobility Cost Management Virtual Desktop IT Management Data storage LiFi Safety VPN Meetings Outlook Employees Integration Money Computer Repair User Tip Humor Modem Processor Mobile Security Holidays Sports Mouse Data Storage Supply Chain Machine Learning Smart Technology Customer Relationship Management Video Conferencing Administration Managed Services Provider Professional Services Saving Time Virtual Machines Hacking Presentation Maintenance Antivirus Managed IT Service Downloads Wireless Technology iPhone Settings Licensing Wireless Printing Content Filtering Vulnerabilities Entertainment YouTube Data Privacy Word Images 101 Cryptocurrency Robot Google Docs Social Networking Organization Unified Communications Legislation Experience Public Speaking Shortcuts Lithium-ion battery Ransmoware Fileless Malware Unified Threat Management Digital Security Cameras Bitcoin Smart Devices Running Cable Google Wallet Wearable Technology Remote Working Memory Vendors Unified Threat Management Entrepreneur Content Health IT Motherboard Comparison Data Breach Google Play Be Proactive Laptop Workforce Directions Assessment Videos Windows 8 Network Congestion Permissions Electronic Health Records Drones Wasting Time Threats Undo User Error Specifications Trend Micro Security Cameras Workplace Strategies Halloween Meta Microchip Point of Sale Internet Exlporer Fraud Software as a Service Managing Costs Amazon Username Network Management Tech Support Black Friday eCommerce SSID Surveillance Scary Stories Virtual Assistant Outsource IT Application Database Hacks Monitors IT Technicians Virtual Machine Environment Fun Media Medical IT Proxy Server Websites Cookies Reviews Deep Learning Cyber Monday IBM Development Transportation Small Businesses Tactics Hotspot Electronic Medical Records Mirgation Education Hypervisor Displays SharePoint PowerPoint Nanotechnology Shopping Optimization Employer/Employee Relationships Outsourcing Lenovo Addiction Mobile Computing Writing Language Management Virtual Reality Chatbots PCI DSS Search Competition Navigation Workplace Server Management Private Cloud Screen Reader Gig Economy Best Practice Distributed Denial of Service Computing Infrastructure Internet Service Provider Buisness Teamwork Hiring/Firing Superfish Identity Theft Service Level Agreement Legal Twitter Identity Regulations Compliance IT solutions Evernote Paperless Co-managed IT User Bookmark Error Smart Tech Business Growth Memes Alerts Net Neutrality SQL Server Technology Care Download Social Engineering Remote Computing Financial Data History Cortana Business Communications IP Address Scams Browsers Connectivity Smartwatch Alt Codes Break Fix IT Procurement Downtime Azure Hybrid Work Tablet Upload Social Network Alert Telework Hosted Solution Multi-Factor Security Cyber security Tech Human Resources Cables Recovery Managed IT File Sharing IoT CES Typing Dark Data Dark Web Communitications How To Supply Chain Management Hard Drives Trends Customer Resource management Google Drive Notifications Regulations FinTech Google Calendar Knowledge Domains Term Google Apps IT Maintenance Data Analysis Travel Star Wars Microsoft Excel IT Assessment Staff Flexibility Value Business Intelligence 5G Refrigeration Techology Google Maps Gamification

Blog Archive