Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google IT Services Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Disaster Recovery Upgrade Data Recovery AI Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Artificial Intelligence Holiday Automation Facebook Information Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Office Windows 10 Government Business Continuity Data Management Bandwidth Business Technology Windows 10 Wi-Fi Blockchain Virtualization Data Security Apps Mobile Office Two-factor Authentication Vendor Chrome Employer-Employee Relationship Budget BYOD Apple Managed Services Voice over Internet Protocol App Tip of the week Mobile Device Management Gmail WiFi Networking Applications BDR Office 365 Hacker Conferencing Avoiding Downtime Access Control Marketing Computing Information Technology HIPAA How To Analytics Office Tips Augmented Reality Help Desk Storage Password Computers 2FA Virtual Private Network Bring Your Own Device Health Website Healthcare Operating System Retail Risk Management Managed IT Services Router Big Data Social Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Monitoring Windows 11 Customer Service Physical Security Display Printer Excel Paperless Office Infrastructure Telephone Remote Workers Going Green Cooperation Document Management Free Resource Firewall Cybercrime Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Employees Integration User Tip Modem Outlook Mobile Security Processor Robot Money Humor Customer Relationship Management Holidays Smart Technology IT Management VPN Data Storage Meetings Sports Hacking Mouse Video Conferencing Presentation Saving Time Supply Chain Managed Services Provider Virtual Machines Computer Repair Professional Services Managed IT Service Administration Wireless Technology Downloads Licensing iPhone Machine Learning Entertainment Word Settings Wireless Vulnerabilities Printing Content Filtering Maintenance YouTube Telephone System Data Privacy Images 101 Cost Management Antivirus Mobility Cryptocurrency Safety Multi-Factor Authentication Virtual Desktop Data storage LiFi How To Application Security Cameras Username Workforce Windows 8 Laptop Trend Micro Black Friday Software as a Service Notifications Threats Drones Database Workplace Strategies Travel IBM Managing Costs eCommerce SSID Meta IT Technicians Techology Google Maps Halloween Cyber Monday Surveillance Virtual Assistant Proxy Server Amazon Cookies Tactics Hotspot Unified Threat Management Virtual Machine Scary Stories Medical IT Outsource IT Mirgation Unified Threat Management Hacks Reviews Development Competition Fun Transportation Environment Nanotechnology Media Addiction Language Deep Learning Hypervisor Network Congestion Optimization PowerPoint Management Small Businesses Chatbots User Error Shopping Distributed Denial of Service Education Employer/Employee Relationships Displays Screen Reader Navigation Service Level Agreement Computing Infrastructure PCI DSS Point of Sale User Outsourcing Identity Mobile Computing Gig Economy Network Management Internet Service Provider Tech Support Search Teamwork Bookmark Smart Tech Monitors Evernote Download Workplace Alerts Best Practice Regulations Compliance IP Address Buisness Memes Hiring/Firing Legal Break Fix IT solutions Net Neutrality Websites SQL Server Browsers Connectivity Paperless Recovery Upload Co-managed IT Business Growth Financial Data History IT Electronic Medical Records Hard Drives Social Network Technology Care SharePoint Smartwatch Multi-Factor Security IoT Business Communications Dark Web Procurement Domains Cortana Azure Writing Tech Trends Scams Lenovo Alt Codes Telework Cyber security Google Calendar Downtime Communitications Virtual Reality Refrigeration Customer Resource management Hybrid Work Regulations CES Star Wars Human Resources Microsoft Excel Server Management Hosted Solution Supply Chain Management Private Cloud Public Speaking Data Analysis Term Gamification Cables Staff Superfish Typing FinTech Identity Theft Lithium-ion battery Legislation IT Assessment Twitter Entrepreneur Social Networking Google Apps Google Drive Flexibility Error Knowledge Value Fileless Malware Social Engineering Content IT Maintenance Wearable Technology Organization Comparison Smart Devices Remote Computing Undo 5G Health IT Business Intelligence Motherboard Digital Security Cameras Assessment Shortcuts Google Docs Permissions Unified Communications Remote Working Experience Memory Directions Google Play Ransmoware Bitcoin Tablet Running Cable Data Breach Specifications Electronic Health Records Alert Vendors Google Wallet Videos Internet Exlporer Be Proactive Fraud Managed IT File Sharing Wasting Time Microchip Dark Data

Blog Archive