Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Business Technology Bandwidth Virtualization Blockchain Vendor Mobile Office Two-factor Authentication Apps Data Security Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Apple Networking Employer-Employee Relationship App Hacker HIPAA Avoiding Downtime Computing Applications Information Technology Marketing Access Control Office 365 Conferencing How To BDR Computers Operating System Router Healthcare Website Virtual Private Network Risk Management Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Big Data Bring Your Own Device Managed IT Services 2FA Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Remote Workers Physical Security Display Printer Free Resource Paperless Office Project Management Infrastructure Firewall Monitoring Windows 7 Microsoft 365 Document Management Solutions The Internet of Things Telephone Scam Social Data loss Windows 11 Cooperation Going Green Patch Management Customer Service Excel Save Money Professional Services Settings Presentation Virtual Machines Printing Wireless Content Filtering IT Management Wireless Technology VPN YouTube Meetings Cryptocurrency iPhone User Tip Modem Computer Repair Mobile Security Processor Word Vulnerabilities Data Privacy Virtual Desktop Data storage LiFi Images 101 Smart Technology Mobility Outlook Multi-Factor Authentication Machine Learning Safety Money Saving Time Humor Managed IT Service Employees Maintenance Antivirus Integration Sports Downloads Mouse Licensing Entertainment Administration Holidays Customer Relationship Management Data Storage Supply Chain Video Conferencing Telephone System Robot Hacking Managed Services Provider Cost Management Alt Codes Content Workplace Wearable Technology Gig Economy Internet Service Provider User Health IT Teamwork Hiring/Firing Downtime Unified Threat Management Motherboard Comparison Permissions Regulations Compliance Unified Threat Management Directions Hosted Solution Assessment Evernote Paperless Typing Co-managed IT Memes IP Address Net Neutrality SQL Server Technology Care Network Congestion Specifications Knowledge Fraud Financial Data Google Drive User Error Microchip History Internet Exlporer Business Communications Username Scams Smartwatch IT Procurement Recovery Azure Hybrid Work Point of Sale 5G Black Friday Experience Telework Hard Drives Google Docs Cyber security Unified Communications Database Tech Human Resources Communitications Bitcoin Network Management Cables Running Cable Tech Support IT Technicians CES Domains Supply Chain Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Term Google Apps Hotspot FinTech Refrigeration Tactics IT Assessment Windows 8 IT Maintenance Laptop Websites Mirgation Public Speaking Lithium-ion battery Flexibility Drones Value Business Intelligence Nanotechnology Shortcuts Electronic Medical Records Language Organization SharePoint Entrepreneur Addiction Smart Devices Management Ransmoware Halloween Chatbots Digital Security Cameras Remote Working Lenovo Memory Vendors Screen Reader Writing Distributed Denial of Service Google Play Be Proactive Virtual Reality Computing Infrastructure Undo Data Breach Service Level Agreement Electronic Health Records Hacks Server Management Workforce Scary Stories Private Cloud Identity Videos Superfish Bookmark Wasting Time Threats Identity Theft Smart Tech Fun Security Cameras Workplace Strategies Twitter Alerts Trend Micro Deep Learning Download Software as a Service Meta Error Application Browsers Managing Costs Amazon Education Connectivity Social Engineering Break Fix SSID Remote Computing eCommerce Upload Surveillance Mobile Computing Social Network Virtual Assistant Outsource IT Multi-Factor Security IBM Virtual Machine Environment Tablet IoT Media Search Dark Web Medical IT Alert Reviews Best Practice Trends Development Managed IT Customer Resource management Transportation Small Businesses Buisness File Sharing Regulations Dark Data Google Calendar Legal Data Analysis Hypervisor Displays IT solutions Star Wars How To Microsoft Excel PowerPoint Notifications Staff Shopping Competition Optimization Business Growth Gamification Employer/Employee Relationships Outsourcing Travel Social Networking Legislation PCI DSS Techology Fileless Malware Google Maps Navigation Cortana

Blog Archive