Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Holiday Information Automation Compliance Cloud Computing Training Gadgets Covid-19 Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Wi-Fi Virtualization Blockchain Business Technology Mobile Office Data Security Two-factor Authentication Vendor Apps Chrome Budget Managed Services Apple Networking Voice over Internet Protocol Mobile Device Management App Gmail WiFi BYOD Employer-Employee Relationship Tip of the week Hacker Avoiding Downtime Marketing Conferencing How To BDR Computing Information Technology HIPAA Access Control Applications Office 365 Computers Augmented Reality 2FA Retail Help Desk Storage Password Website Bring Your Own Device Managed IT Services Healthcare Operating System Big Data Physical Security Virtual Private Network Risk Management Router Health Analytics Office Tips Windows 11 Document Management Monitoring Excel Scam Data loss Remote Workers Telephone Firewall Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring End of Support Project Management Vulnerability The Internet of Things Windows 7 Vendor Management Cybercrime Microsoft 365 Social Display Printer Solutions Paperless Office Infrastructure Customer Service Money Holidays Presentation Humor Data Storage Smart Technology Supply Chain Wireless Technology Video Conferencing Maintenance Sports Managed Services Provider Antivirus Mouse Professional Services Saving Time Virtual Machines Managed IT Service Word Administration Downloads iPhone Licensing Robot Vulnerabilities Entertainment Safety Data Privacy Settings Wireless Printing Content Filtering Images 101 IT Management YouTube Meetings Telephone System Multi-Factor Authentication VPN Mobility Cost Management Cryptocurrency Computer Repair Virtual Desktop Employees Customer Relationship Management Data storage Integration LiFi User Tip Modem Outlook Mobile Security Processor Machine Learning Hacking Lenovo Cyber Monday Medical IT Writing Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses User Virtual Reality Scary Stories Private Cloud Mirgation Hypervisor Displays Hacks Server Management Superfish PowerPoint Identity Theft Fun Shopping Nanotechnology Optimization Addiction IP Address Language Employer/Employee Relationships Outsourcing Deep Learning Twitter Error Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Education Social Engineering Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Recovery Remote Computing Regulations Compliance Identity Hard Drives Mobile Computing Evernote Paperless Domains Co-managed IT Tablet Search Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Best Practice Alert Buisness File Sharing Dark Data Financial Data History Refrigeration Managed IT Business Communications Public Speaking Legal Break Fix Scams IT solutions How To Browsers Smartwatch Connectivity IT Upload Procurement Lithium-ion battery Azure Hybrid Work Business Growth Notifications Entrepreneur Travel Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Techology Dark Web Cables Google Maps Cortana CES IoT Communitications Trends Supply Chain Management Alt Codes Downtime Unified Threat Management Customer Resource management FinTech Regulations Undo Google Calendar Term Google Apps Unified Threat Management Microsoft Excel IT Maintenance Hosted Solution Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Typing Network Congestion Organization Social Networking Legislation Shortcuts Smart Devices Google Drive User Error Ransmoware Knowledge Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Application Comparison Google Play Be Proactive Point of Sale 5G Health IT Motherboard Data Breach Assessment Electronic Health Records IBM Google Docs Permissions Workforce Unified Communications Experience Directions Videos Running Cable Tech Support Wasting Time Threats Bitcoin Network Management Google Wallet Specifications Security Cameras Workplace Strategies Monitors Trend Micro Internet Exlporer Software as a Service Fraud Meta Microchip Laptop Websites Username Managing Costs Amazon Windows 8 Drones Black Friday SSID eCommerce Competition Database Surveillance SharePoint Virtual Assistant Outsource IT Electronic Medical Records Halloween IT Technicians Virtual Machine Environment Media

Blog Archive