Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI VoIP Mobile Devices Data Recovery communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Facebook Information Artificial Intelligence Automation Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Government Business Continuity Data Management Virtualization Bandwidth Business Technology Windows 10 Blockchain Wi-Fi Data Security Vendor Two-factor Authentication Apps Mobile Office BYOD Employer-Employee Relationship Chrome Budget Tip of the week Apple App Mobile Device Management Gmail Managed Services Voice over Internet Protocol Networking BDR HIPAA Information Technology WiFi Applications Office 365 Access Control Hacker Conferencing Avoiding Downtime Marketing How To Computing Risk Management Router Big Data Office Tips Analytics Augmented Reality Help Desk Virtual Private Network Storage Computers Health Password Bring Your Own Device Website Retail 2FA Operating System Managed IT Services Healthcare The Internet of Things Patch Management Save Money Remote Monitoring Free Resource Social Vulnerability End of Support Project Management Vendor Management Windows 7 Physical Security Microsoft 365 Monitoring Display Solutions Printer Customer Service Paperless Office Infrastructure Telephone Document Management Cooperation Going Green Windows 11 Firewall Scam Data loss Cybercrime Excel Remote Workers Cryptocurrency iPhone Robot Vulnerabilities Virtual Desktop User Tip Modem Data storage LiFi Mobile Security Processor Images 101 IT Management Mobility VPN Meetings Outlook Multi-Factor Authentication Data Privacy Customer Relationship Management Money Humor Smart Technology Computer Repair Hacking Saving Time Employees Presentation Sports Integration Mouse Wireless Technology Managed IT Service Machine Learning Downloads Administration Holidays Licensing Data Storage Entertainment Word Video Conferencing Maintenance Antivirus Managed Services Provider Settings Professional Services Virtual Machines Printing Supply Chain Wireless Telephone System Content Filtering Cost Management Safety YouTube How To IT Paperless Directions Assessment Smartwatch Permissions Notifications Procurement Azure Co-managed IT 5G Experience Tech Travel Google Docs Telework Specifications Unified Communications Cyber security Technology Care Bitcoin Communitications Running Cable Business Communications Microchip Techology Internet Exlporer Google Maps CES Fraud Username Google Wallet Supply Chain Management Application Scams Term Unified Threat Management FinTech Black Friday Hybrid Work Windows 8 IT Assessment Laptop Human Resources Unified Threat Management Database IBM IT Technicians Drones Flexibility Value Cables Proxy Server Cookies Organization Cyber Monday Network Congestion Hotspot Smart Devices Halloween Google Apps User Error Tactics Digital Security Cameras Mirgation Remote Working Memory IT Maintenance Google Play Nanotechnology Point of Sale Competition Data Breach Business Intelligence Language Hacks Electronic Health Records Scary Stories Shortcuts Addiction Videos Management Network Management Chatbots Tech Support Wasting Time Ransmoware Fun Security Cameras Screen Reader Distributed Denial of Service Monitors Deep Learning Trend Micro Vendors Computing Infrastructure Software as a Service User Be Proactive Service Level Agreement Identity Websites Education Managing Costs Workforce SSID Bookmark Smart Tech eCommerce Threats Alerts Electronic Medical Records Mobile Computing Surveillance Virtual Assistant Workplace Strategies SharePoint Download IP Address Virtual Machine Meta Search Medical IT Browsers Lenovo Connectivity Reviews Break Fix Writing Best Practice Amazon Virtual Reality Development Recovery Buisness Transportation Upload Social Network Server Management Private Cloud Legal Hard Drives Multi-Factor Security IT solutions Hypervisor Outsource IT PowerPoint Media Superfish IoT Identity Theft Shopping Domains Dark Web Business Growth Optimization Environment Twitter Employer/Employee Relationships Trends Customer Resource management Regulations Error PCI DSS Refrigeration Google Calendar Small Businesses Cortana Navigation Data Analysis Star Wars Gig Economy Public Speaking Microsoft Excel Social Engineering Alt Codes Displays Lithium-ion battery Staff Remote Computing Internet Service Provider Downtime Teamwork Gamification Social Networking Regulations Compliance Legislation Hosted Solution Outsourcing Entrepreneur Evernote Memes Fileless Malware Tablet Typing Wearable Technology Alert Net Neutrality SQL Server Workplace Content Health IT Managed IT Motherboard File Sharing Google Drive Financial Data Undo Comparison Dark Data History Hiring/Firing Knowledge

Blog Archive