Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware Phishing IT Support Email Workplace Tips Privacy Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Managed Service Ransomware Mobile Device Productivity AI Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Covid-19 Training Outsourced IT Server Remote Work Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Managed Services Data Security Apps Vendor Two-factor Authentication Mobile Office Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Password Managed IT Services How To BDR HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Storage Bring Your Own Device Healthcare Big Data Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics 2FA Augmented Reality Retail Telephone The Internet of Things Scam Remote Workers Data loss Social Cooperation Going Green Patch Management Free Resource Project Management Save Money Windows 7 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Microsoft 365 Solutions Display Printer Paperless Office Infrastructure Monitoring Windows 11 Firewall Document Management Excel Managed IT Service Virtual Machines Professional Services Safety Maintenance Antivirus Sports Downloads Mouse Licensing Entertainment Administration iPhone Vulnerabilities Telephone System Robot Data Privacy Customer Relationship Management Cost Management Settings Images 101 Printing Wireless Multi-Factor Authentication Mobility Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Employees Integration Virtual Desktop Data storage LiFi Word Smart Technology Holidays Outlook Machine Learning Money Saving Time Data Storage Supply Chain Humor Video Conferencing Managed Services Provider Twitter Alerts Gig Economy Workplace Deep Learning Download Undo Error Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Browsers Education Connectivity Social Engineering Break Fix Regulations Compliance Remote Computing Memes Co-managed IT Upload Mobile Computing Social Network Multi-Factor Security Net Neutrality SQL Server Technology Care History Business Communications Tablet IoT Search Dark Web Financial Data Alert Smartwatch IT Scams Application Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Procurement Azure Hybrid Work Cyber security Tech Human Resources IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Telework Notifications Staff CES Communitications Cables Business Growth Gamification Travel Social Networking Legislation Supply Chain Management Term Google Apps Techology Fileless Malware Google Maps Cortana FinTech Wearable Technology IT Assessment IT Maintenance Alt Codes Content Competition Health IT Downtime Unified Threat Management Motherboard Comparison Flexibility Value Business Intelligence Shortcuts Unified Threat Management Directions Hosted Solution Assessment Permissions Organization Digital Security Cameras Smart Devices Ransmoware Typing Network Congestion Specifications Remote Working Memory Vendors Data Breach Google Play Be Proactive Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Videos Electronic Health Records Workforce Username Point of Sale 5G Black Friday Wasting Time Threats Trend Micro Security Cameras Workplace Strategies IP Address Google Docs Unified Communications Database Experience Running Cable Tech Support IT Technicians Software as a Service Meta Bitcoin Network Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Managing Costs Amazon eCommerce SSID Recovery Tactics Hotspot Windows 8 Laptop Websites Mirgation Surveillance Virtual Assistant Outsource IT Hard Drives Media Domains Drones Nanotechnology Virtual Machine Environment Electronic Medical Records Language Reviews Medical IT SharePoint Addiction Refrigeration Management Halloween Chatbots Development Transportation Small Businesses Hypervisor Displays Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Shopping Optimization PowerPoint Lithium-ion battery Service Level Agreement Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Employer/Employee Relationships Outsourcing Navigation Superfish Bookmark Identity Theft Smart Tech Fun PCI DSS

Blog Archive