Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Productivity Passwords Backup Communication Cybersecurity Saving Money Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones VoIP AI Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Facebook Automation Information Covid-19 Cloud Computing Miscellaneous Gadgets Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship Spam Encryption IT Support Windows 10 Office Government Business Continuity Data Management Bandwidth Virtualization Business Technology Blockchain Wi-Fi Windows 10 Apps Vendor Mobile Office Two-factor Authentication Data Security Chrome Budget BYOD Apple Employer-Employee Relationship App Managed Services Tip of the week Voice over Internet Protocol Mobile Device Management Networking Gmail WiFi Conferencing Access Control Hacker Avoiding Downtime Computing HIPAA Information Technology Marketing Applications How To Office 365 BDR Augmented Reality Storage Password Big Data Bring Your Own Device Virtual Private Network Health 2FA Computers Operating System Healthcare Retail Router Website Risk Management Managed IT Services Analytics Office Tips Help Desk Patch Management Solutions Save Money Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Social Telephone Physical Security Display Printer Cooperation Paperless Office Infrastructure Going Green Customer Service Windows 11 Remote Workers Document Management Cybercrime Excel Free Resource Scam Data loss Project Management Windows 7 Firewall Microsoft 365 Monitoring Robot Money Safety Humor Employees Saving Time Integration Sports IT Management Managed IT Service Mouse VPN Meetings Downloads Holidays Licensing Administration Data Storage Computer Repair Entertainment Customer Relationship Management Video Conferencing Managed Services Provider Virtual Machines Professional Services Hacking Settings Telephone System Presentation Printing Wireless Cost Management Machine Learning Supply Chain Content Filtering Wireless Technology YouTube iPhone Maintenance Cryptocurrency Antivirus Vulnerabilities User Tip Modem Word Images 101 Virtual Desktop Processor Mobile Security Data storage LiFi Multi-Factor Authentication Mobility Data Privacy Outlook Smart Technology Language Videos Electronic Health Records Addiction Travel IT Maintenance Management Google Maps Wasting Time Business Intelligence Chatbots Undo Techology Hacks Scary Stories Trend Micro Screen Reader Security Cameras Shortcuts Distributed Denial of Service Ransmoware Computing Infrastructure Software as a Service Fun Service Level Agreement Unified Threat Management Managing Costs Vendors Identity Deep Learning Unified Threat Management Bookmark eCommerce Smart Tech SSID Be Proactive Virtual Assistant Workforce Alerts Network Congestion Application Education Surveillance Download Virtual Machine Threats User Error Mobile Computing Reviews Browsers Connectivity IBM Medical IT Workplace Strategies Break Fix Transportation Meta Development Search Upload Point of Sale Social Network Hypervisor Amazon Multi-Factor Security Best Practice Shopping Buisness Network Management Optimization IoT Tech Support PowerPoint Dark Web Employer/Employee Relationships Outsource IT Monitors Legal IT solutions Trends PCI DSS Customer Resource management Environment Regulations Competition Navigation Media Google Calendar Business Growth Gig Economy Data Analysis Star Wars Websites Microsoft Excel Teamwork Small Businesses Staff Internet Service Provider Cortana Gamification Regulations Compliance Displays Social Networking Electronic Medical Records Evernote Legislation Alt Codes SharePoint User Downtime Fileless Malware Memes SQL Server Outsourcing Wearable Technology Writing Hosted Solution Lenovo Net Neutrality Content Financial Data Health IT History Motherboard Virtual Reality Comparison Typing Smartwatch Directions Server Management IT Assessment Private Cloud IP Address Workplace Permissions Azure Hiring/Firing Google Drive Superfish Procurement Knowledge Identity Theft Telework Cyber security Twitter Tech Paperless Specifications Recovery CES Microchip Communitications 5G Internet Exlporer Error Co-managed IT Fraud Technology Care Social Engineering Hard Drives Google Docs Unified Communications Supply Chain Management Experience Username FinTech Running Cable Remote Computing Domains Term Business Communications Black Friday Bitcoin Google Wallet IT Assessment Database Scams Tablet Value Hybrid Work IT Technicians Refrigeration Flexibility Organization Laptop Proxy Server Cookies Alert Public Speaking Human Resources Cyber Monday Windows 8 Dark Data Drones Digital Security Cameras Managed IT Smart Devices Tactics File Sharing Lithium-ion battery Cables Hotspot Memory Mirgation How To Entrepreneur Remote Working Halloween Data Breach Nanotechnology Notifications Google Play Google Apps

Blog Archive