Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Information Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Spam IT Support Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Virtualization Blockchain Business Technology Bandwidth Windows 10 Two-factor Authentication Apps Vendor Mobile Office Data Security Gmail BYOD Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Mobile Device Management Managed Services Voice over Internet Protocol Computing WiFi Information Technology Access Control Office 365 HIPAA Applications Hacker Avoiding Downtime How To Marketing BDR Conferencing Operating System Healthcare Risk Management Virtual Private Network Big Data Health Analytics Office Tips Augmented Reality Router Retail Storage Computers Password Bring Your Own Device Managed IT Services Website 2FA Help Desk Vendor Management Telephone Cybercrime Physical Security The Internet of Things Display Printer Cooperation Free Resource Project Management Social Paperless Office Windows 7 Infrastructure Microsoft 365 Document Management Solutions Customer Service Scam Data loss Windows 11 Monitoring Excel Going Green Patch Management Save Money Firewall Remote Monitoring End of Support Remote Workers Vulnerability Content Filtering IT Management Downloads YouTube Meetings iPhone Safety VPN Licensing Cryptocurrency Vulnerabilities Entertainment Data Privacy Computer Repair Virtual Desktop Images 101 Data storage LiFi Telephone System Multi-Factor Authentication Mobility Cost Management Outlook Customer Relationship Management Machine Learning Money Humor Employees Integration Hacking Presentation Maintenance User Tip Antivirus Modem Sports Mobile Security Processor Mouse Wireless Technology Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Word Managed Services Provider Professional Services Robot Saving Time Virtual Machines Settings Managed IT Service Wireless Printing Unified Threat Management Download Net Neutrality Entrepreneur Hosted Solution Alerts SQL Server Technology Care Financial Data Typing History Business Communications Break Fix Scams Network Congestion Browsers Smartwatch Connectivity IT Undo Google Drive User Error Upload Procurement Azure Hybrid Work Knowledge Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Point of Sale Dark Web Cables 5G CES IoT Communitications Google Docs Trends Supply Chain Management Unified Communications Experience Customer Resource management FinTech Bitcoin Network Management Regulations Running Cable Tech Support Google Calendar Term Google Apps Microsoft Excel IT Maintenance Monitors Data Analysis Application Google Wallet Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence IBM Organization Windows 8 Social Networking Laptop Websites Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras Drones Smart Devices SharePoint Content Remote Working Wearable Technology Memory Vendors Electronic Medical Records Health IT Motherboard Data Breach Halloween Comparison Google Play Be Proactive Assessment Electronic Health Records Permissions Workforce Writing Directions Videos Lenovo Competition Wasting Time Threats Virtual Reality Specifications Security Cameras Workplace Strategies Hacks Server Management Trend Micro Scary Stories Private Cloud Internet Exlporer Software as a Service Identity Theft Fraud Meta Fun Microchip Superfish Username Deep Learning Managing Costs Amazon Twitter Black Friday SSID User eCommerce Error Database Surveillance Education Virtual Assistant Outsource IT Social Engineering IT Technicians Virtual Machine Environment Remote Computing Media Cyber Monday Medical IT IP Address Proxy Server Reviews Mobile Computing Cookies Tactics Development Tablet Hotspot Transportation Small Businesses Search Best Practice Mirgation Hypervisor Displays Alert PowerPoint Dark Data Shopping Recovery Managed IT Nanotechnology Optimization Buisness File Sharing Addiction IT solutions Language Employer/Employee Relationships Outsourcing How To Hard Drives Legal Domains Management PCI DSS Business Growth Chatbots Notifications Navigation Distributed Denial of Service Workplace Gig Economy Screen Reader Travel Techology Service Level Agreement Internet Service Provider Google Maps Computing Infrastructure Teamwork Hiring/Firing Cortana Refrigeration Public Speaking Regulations Compliance Alt Codes Identity Evernote Paperless Downtime Unified Threat Management Co-managed IT Lithium-ion battery Bookmark Smart Tech Memes

Blog Archive