Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Smartphone Data Backup Android Upgrade Smartphones AI VoIP Business Management Mobile Devices Data Recovery communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Network Current Events Remote Tech Term Internet of Things Information Artificial Intelligence Facebook Automation Gadgets Cloud Computing Covid-19 Holiday Training Miscellaneous Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Bandwidth Windows 10 Business Technology Virtualization Apps Vendor Data Security Two-factor Authentication Mobile Office Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking BYOD Chrome Mobile Device Management Budget Gmail Apple Tip of the week App HIPAA Computing How To Applications Hacker Information Technology BDR Avoiding Downtime Office 365 Marketing Conferencing Access Control WiFi Retail 2FA Operating System Healthcare Router Managed IT Services Computers Risk Management Website Help Desk Analytics Office Tips Augmented Reality Virtual Private Network Storage Password Health Bring Your Own Device Big Data Going Green Windows 11 Remote Workers Scam Data loss Cybercrime Customer Service Excel Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Solutions Physical Security Firewall Display Printer Telephone Paperless Office Infrastructure The Internet of Things Cooperation Social Document Management Telephone System Virtual Machines Professional Services Cost Management Maintenance Settings Customer Relationship Management Wireless Antivirus Printing Content Filtering Supply Chain iPhone YouTube Hacking Cryptocurrency Presentation Vulnerabilities User Tip Modem Mobile Security Processor Wireless Technology Virtual Desktop Images 101 Robot Data storage LiFi Multi-Factor Authentication Mobility Smart Technology Outlook Word IT Management VPN Saving Time Meetings Data Privacy Money Humor Employees Managed IT Service Integration Computer Repair Downloads Sports Safety Mouse Licensing Holidays Administration Entertainment Data Storage Machine Learning Video Conferencing Managed Services Provider IBM Server Management Gig Economy Private Cloud Outsource IT Social Networking Legislation Internet Service Provider Media Teamwork Cortana Superfish Fileless Malware Identity Theft Environment Content Regulations Compliance Twitter Wearable Technology Alt Codes Evernote Health IT Error Small Businesses Motherboard Memes Comparison Downtime Net Neutrality Social Engineering Permissions Hosted Solution SQL Server Directions Displays Assessment Financial Data Remote Computing Typing History Competition Smartwatch Outsourcing IT Specifications Google Drive Procurement Fraud Azure Knowledge Microchip Tablet Internet Exlporer Username Telework Alert Workplace Cyber security Tech 5G User Managed IT CES File Sharing Hiring/Firing Communitications Dark Data Black Friday Google Docs Supply Chain Management How To Paperless Unified Communications Experience Database FinTech Notifications Co-managed IT IT Technicians Bitcoin Running Cable Term IP Address Proxy Server Travel Technology Care Cookies Google Wallet IT Assessment Cyber Monday Tactics Flexibility Business Communications Hotspot Value Techology Google Maps Organization Scams Mirgation Windows 8 Laptop Recovery Digital Security Cameras Unified Threat Management Hybrid Work Nanotechnology Drones Smart Devices Addiction Remote Working Human Resources Language Memory Hard Drives Unified Threat Management Management Cables Chatbots Data Breach Halloween Google Play Domains Distributed Denial of Service Videos Screen Reader Electronic Health Records Network Congestion Service Level Agreement Google Apps Computing Infrastructure Wasting Time Refrigeration User Error IT Maintenance Identity Hacks Trend Micro Scary Stories Security Cameras Public Speaking Lithium-ion battery Fun Bookmark Point of Sale Business Intelligence Smart Tech Software as a Service Download Shortcuts Alerts Deep Learning Managing Costs Entrepreneur Network Management Tech Support Ransmoware eCommerce SSID Break Fix Education Virtual Assistant Browsers Vendors Connectivity Surveillance Monitors Upload Be Proactive Virtual Machine Undo Social Network Reviews Websites Workforce Mobile Computing Multi-Factor Security Medical IT Dark Web Transportation Search Threats IoT Development Trends Electronic Medical Records Workplace Strategies Best Practice Hypervisor SharePoint Customer Resource management Shopping Meta Regulations Optimization Google Calendar Buisness PowerPoint Writing Microsoft Excel IT solutions Employer/Employee Relationships Application Lenovo Data Analysis Amazon Star Wars Legal Gamification PCI DSS Virtual Reality Staff Business Growth Navigation

Blog Archive