Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Productivity Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade VoIP Smartphones AI Business Management Data Recovery Mobile Devices communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Apps Data Security Two-factor Authentication Vendor Mobile Office Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Chrome Tip of the week Gmail Budget Apple How To BDR Computing Hacker Information Technology Avoiding Downtime HIPAA Marketing Applications Office 365 Access Control WiFi Conferencing Managed IT Services Operating System Computers Healthcare Risk Management Virtual Private Network Router Website Health Analytics Office Tips Augmented Reality Help Desk Storage Password Retail 2FA Bring Your Own Device Big Data Social Telephone Going Green Cooperation Patch Management Save Money Customer Service Remote Monitoring End of Support Cybercrime Remote Workers Vulnerability Vendor Management Physical Security Display Printer Free Resource Project Management Windows 7 Paperless Office Infrastructure Microsoft 365 Firewall Solutions Document Management Monitoring Windows 11 The Internet of Things Scam Excel Data loss Holidays Downloads Data Storage Licensing Video Conferencing Entertainment Customer Relationship Management Managed Services Provider Robot Settings Virtual Machines Professional Services Printing Wireless Content Filtering Hacking Presentation YouTube Telephone System Data Privacy Cost Management IT Management VPN iPhone Meetings Cryptocurrency Wireless Technology Vulnerabilities Computer Repair Virtual Desktop LiFi Data storage Images 101 Modem Word User Tip Processor Multi-Factor Authentication Mobile Security Mobility Outlook Money Machine Learning Humor Smart Technology Employees Safety Integration Sports Saving Time Maintenance Mouse Supply Chain Antivirus Managed IT Service Administration Best Practice Reviews Download Workplace Alerts Application Medical IT Transportation Tablet Buisness Hiring/Firing Development Browsers Connectivity IBM Paperless Hypervisor Break Fix Legal Alert IT solutions File Sharing Business Growth Dark Data Shopping Upload Co-managed IT Optimization Managed IT PowerPoint Employer/Employee Relationships Multi-Factor Security How To Social Network Technology Care Cortana PCI DSS IoT Business Communications Dark Web Navigation Notifications Travel Alt Codes Gig Economy Trends Scams Internet Service Provider Regulations Competition Techology Teamwork Google Calendar Google Maps Downtime Customer Resource management Hybrid Work Hosted Solution Data Analysis Regulations Compliance Star Wars Human Resources Microsoft Excel Evernote Unified Threat Management Typing Gamification Cables Memes Staff Net Neutrality Social Networking Unified Threat Management SQL Server Legislation Fileless Malware Knowledge Financial Data Google Apps History User Google Drive Network Congestion Smartwatch Content IT Maintenance IT Wearable Technology 5G Procurement Motherboard User Error Azure Comparison Health IT Business Intelligence Unified Communications Directions Experience Telework Assessment IP Address Shortcuts Cyber security Permissions Tech Google Docs Point of Sale Bitcoin Running Cable CES Ransmoware Communitications Vendors Supply Chain Management Specifications Google Wallet Tech Support Microchip FinTech Internet Exlporer Be Proactive Fraud Recovery Network Management Term Windows 8 Monitors Laptop Username Workforce IT Assessment Hard Drives Threats Flexibility Domains Value Black Friday Drones Websites Organization Database Workplace Strategies Halloween Digital Security Cameras Meta Smart Devices IT Technicians Refrigeration Amazon Remote Working Cookies Public Speaking SharePoint Memory Cyber Monday Electronic Medical Records Proxy Server Tactics Lithium-ion battery Data Breach Hotspot Google Play Lenovo Entrepreneur Hacks Writing Scary Stories Videos Outsource IT Electronic Health Records Mirgation Environment Fun Nanotechnology Media Wasting Time Virtual Reality Private Cloud Deep Learning Addiction Trend Micro Language Server Management Security Cameras Undo Superfish Identity Theft Management Small Businesses Software as a Service Chatbots Displays Screen Reader Managing Costs Distributed Denial of Service Twitter Education Error Service Level Agreement eCommerce Computing Infrastructure SSID Identity Virtual Assistant Mobile Computing Social Engineering Outsourcing Surveillance Bookmark Search Smart Tech Virtual Machine Remote Computing

Blog Archive