Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Artificial Intelligence Holiday Automation Facebook Gadgets Covid-19 Cloud Computing Training Compliance Outsourced IT Remote Work Server Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Apps Two-factor Authentication Vendor Data Security Mobile Office Managed Services Employer-Employee Relationship Networking Chrome Budget BYOD Mobile Device Management Voice over Internet Protocol Apple Gmail App Tip of the week WiFi Computing Information Technology Managed IT Services HIPAA How To BDR Applications Office 365 Hacker Avoiding Downtime Marketing Physical Security Conferencing Access Control Operating System Big Data Retail Risk Management Router Computers Analytics Office Tips Augmented Reality 2FA Help Desk Website Storage Password Virtual Private Network Bring Your Own Device Healthcare Health Windows 7 Cybercrime Social Microsoft 365 Scam Data loss Solutions Customer Service Patch Management Save Money Windows 11 Remote Monitoring End of Support Vulnerability Monitoring Vendor Management Excel Display Printer Managed IT Service Remote Workers Firewall Paperless Office Infrastructure Telephone Going Green The Internet of Things Document Management Cooperation Free Resource Project Management Images 101 Content Filtering YouTube Multi-Factor Authentication Mobility Maintenance Telephone System Cost Management Antivirus Cryptocurrency Customer Relationship Management Virtual Desktop Employees Data storage LiFi Integration Modem Hacking User Tip Outlook Processor Robot Mobile Security Presentation Holidays Money Humor Wireless Technology Data Storage Smart Technology Supply Chain IT Management VPN Meetings Video Conferencing Sports Managed Services Provider Virtual Machines Professional Services Mouse Saving Time Word Computer Repair Administration Downloads iPhone Licensing Safety Machine Learning Vulnerabilities Entertainment Settings Data Privacy Wireless Printing Data Analysis Private Cloud Hosted Solution Star Wars IT Assessment Microsoft Excel IT Maintenance Server Management Superfish Identity Theft Typing Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Application Organization Twitter Google Drive Fileless Malware Digital Security Cameras Error Smart Devices Knowledge Ransmoware IBM Content Remote Working Social Engineering Wearable Technology Memory Vendors Motherboard Data Breach 5G Comparison Google Play Be Proactive Health IT Remote Computing Google Docs Directions Videos Unified Communications Assessment Electronic Health Records Experience Permissions Workforce Tablet Bitcoin Running Cable Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Google Wallet Alert Microchip File Sharing Internet Exlporer Software as a Service Dark Data Fraud Meta Competition Managed IT Windows 8 Username How To Laptop Managing Costs Amazon eCommerce Black Friday SSID Drones Notifications Travel Database Surveillance Virtual Assistant Outsource IT Media Techology User Google Maps Halloween IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Proxy Server Reviews Unified Threat Management Tactics Development Hotspot Transportation Small Businesses IP Address Unified Threat Management Hacks Scary Stories Mirgation Hypervisor Displays Nanotechnology Optimization Fun PowerPoint Shopping Deep Learning Addiction Network Congestion Language Employer/Employee Relationships Outsourcing Navigation User Error Recovery Management PCI DSS Chatbots Education Screen Reader Distributed Denial of Service Workplace Hard Drives Gig Economy Domains Point of Sale Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Mobile Computing Regulations Compliance Identity Tech Support Smart Tech Memes Search Co-managed IT Refrigeration Network Management Bookmark Public Speaking Best Practice Download Net Neutrality Monitors Alerts SQL Server Technology Care Business Communications Lithium-ion battery Financial Data Buisness History Entrepreneur Websites IT solutions Connectivity IT Break Fix Scams Legal Browsers Smartwatch Business Growth Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources SharePoint Social Network Telework Electronic Medical Records Cyber security IoT Communitications Cortana Dark Web Cables Undo CES Lenovo Alt Codes Trends Supply Chain Management Writing Google Calendar Term Google Apps Customer Resource management FinTech Virtual Reality Downtime Regulations

Blog Archive