Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Network Current Events Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption IT Support Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps Networking App Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail Chrome Tip of the week Budget Employer-Employee Relationship Apple How To Hacker BDR Avoiding Downtime Computing HIPAA Marketing Information Technology Applications Office 365 Access Control WiFi Conferencing Managed IT Services Computers Operating System Healthcare Website Router Risk Management Virtual Private Network Analytics Office Tips Health Help Desk Augmented Reality 2FA Big Data Storage Password Bring Your Own Device Retail Cooperation Customer Service Going Green Remote Workers Patch Management Cybercrime Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Physical Security Project Management Firewall Windows 7 Display Printer Microsoft 365 Paperless Office Windows 11 Monitoring Infrastructure The Internet of Things Solutions Excel Document Management Social Telephone Scam Data loss Video Conferencing Managed Services Provider Hacking Presentation Data Privacy Virtual Machines Professional Services Telephone System Settings Wireless Technology Wireless Cost Management Printing Content Filtering Robot iPhone YouTube Cryptocurrency IT Management Word Vulnerabilities VPN Meetings User Tip Modem Images 101 Processor Mobile Security Virtual Desktop Data storage LiFi Computer Repair Multi-Factor Authentication Mobility Outlook Safety Smart Technology Money Humor Supply Chain Employees Saving Time Machine Learning Integration Managed IT Service Sports Mouse Downloads Holidays Maintenance Licensing Administration Antivirus Customer Relationship Management Data Storage Entertainment Employer/Employee Relationships IT solutions Human Resources Trends Legal PCI DSS Customer Resource management Regulations Business Growth Navigation Google Calendar Tablet Cables Alert Gig Economy Data Analysis Star Wars Microsoft Excel Teamwork Staff Managed IT Cortana File Sharing User Dark Data Google Apps Internet Service Provider Gamification Regulations Compliance Social Networking Alt Codes Evernote Legislation How To IT Maintenance Notifications Business Intelligence Fileless Malware Memes Downtime SQL Server Wearable Technology Hosted Solution IP Address Travel Shortcuts Net Neutrality Content Ransmoware Financial Data Health IT History Motherboard Typing Techology Comparison Google Maps Vendors Smartwatch Directions IT Assessment Permissions Azure Knowledge Unified Threat Management Recovery Be Proactive Procurement Google Drive Workforce Telework Cyber security Unified Threat Management Tech Specifications Hard Drives Domains 5G Threats CES Microchip Communitications Internet Exlporer Fraud Unified Communications Experience Network Congestion Workplace Strategies Supply Chain Management Username Google Docs Meta FinTech Bitcoin User Error Term Black Friday Running Cable Refrigeration Public Speaking Amazon IT Assessment Database Google Wallet Value IT Technicians Lithium-ion battery Point of Sale Flexibility Outsource IT Organization Entrepreneur Proxy Server Cookies Windows 8 Cyber Monday Laptop Network Management Tech Support Environment Digital Security Cameras Media Smart Devices Tactics Drones Hotspot Memory Mirgation Monitors Remote Working Small Businesses Data Breach Nanotechnology Google Play Halloween Undo Websites Displays Videos Electronic Health Records Addiction Language Management Wasting Time Chatbots Electronic Medical Records Outsourcing Trend Micro Screen Reader Hacks SharePoint Security Cameras Distributed Denial of Service Scary Stories Computing Infrastructure Fun Software as a Service Service Level Agreement Managing Costs Identity Deep Learning Lenovo Application Writing Workplace Virtual Reality Hiring/Firing Bookmark eCommerce Smart Tech SSID Alerts Education Server Management IBM Private Cloud Paperless Surveillance Download Virtual Assistant Virtual Machine Superfish Identity Theft Co-managed IT Twitter Technology Care Reviews Browsers Connectivity Mobile Computing Medical IT Break Fix Search Error Business Communications Development Upload Transportation Social Network Hypervisor Best Practice Multi-Factor Security Social Engineering Scams Competition Remote Computing Hybrid Work Shopping Optimization IoT PowerPoint Dark Web Buisness

Blog Archive