Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade Business Management AI Smartphones VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Cloud Computing Miscellaneous Holiday Gadgets Training Covid-19 Managed Service Provider Remote Work Server Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Government Business Continuity Wi-Fi Blockchain Windows 10 Virtualization Bandwidth Business Technology Data Security Two-factor Authentication Vendor Apps Mobile Office Networking Managed Services Mobile Device Management Voice over Internet Protocol Gmail BYOD Chrome Budget Employer-Employee Relationship Apple Tip of the week App Computing How To Information Technology BDR HIPAA Applications Office 365 WiFi Access Control Conferencing Hacker Avoiding Downtime Marketing Managed IT Services Risk Management Healthcare Router Analytics Office Tips Augmented Reality Big Data Virtual Private Network Help Desk Storage Password Health Bring Your Own Device 2FA Computers Retail Website Operating System Remote Workers Firewall Patch Management Save Money Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Free Resource Project Management Windows 7 Physical Security Monitoring Social Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Windows 11 Customer Service Telephone Document Management Going Green Excel Cooperation Scam Cybercrime Data loss Telephone System Virtual Machines Professional Services YouTube Cost Management Word Cryptocurrency Robot iPhone Data Privacy Virtual Desktop LiFi Data storage Safety User Tip Modem Vulnerabilities Mobile Security Processor Outlook IT Management VPN Images 101 Meetings Money Humor Multi-Factor Authentication Mobility Smart Technology Computer Repair Sports Saving Time Mouse Customer Relationship Management Employees Administration Integration Managed IT Service Machine Learning Hacking Downloads Presentation Licensing Supply Chain Holidays Entertainment Wireless Technology Settings Maintenance Data Storage Antivirus Wireless Printing Content Filtering Video Conferencing Managed Services Provider Gig Economy Hard Drives Social Networking Legislation Technology Care Business Communications Knowledge Fileless Malware Tablet Internet Service Provider Domains Teamwork Google Drive Alert Wearable Technology Evernote Scams Regulations Compliance Content Managed IT 5G Health IT File Sharing Memes Refrigeration Motherboard Dark Data Comparison Hybrid Work Unified Communications Human Resources Experience Directions Net Neutrality Public Speaking Assessment How To SQL Server Google Docs Permissions Lithium-ion battery Notifications History Bitcoin Cables Running Cable Financial Data Smartwatch Travel IT Google Wallet Entrepreneur Specifications Fraud Google Apps Techology Microchip Google Maps Procurement Internet Exlporer Azure Username Cyber security Tech Windows 8 IT Maintenance Laptop Telework CES Unified Threat Management Communitications Undo Drones Black Friday Business Intelligence Shortcuts Unified Threat Management Supply Chain Management Database IT Technicians Term Ransmoware Halloween FinTech Proxy Server IT Assessment Cookies Network Congestion Cyber Monday Vendors Hotspot Be Proactive User Error Flexibility Tactics Value Organization Application Mirgation Hacks Workforce Scary Stories Fun Digital Security Cameras Point of Sale Smart Devices Nanotechnology Threats Memory Language Deep Learning Workplace Strategies Remote Working IBM Addiction Network Management Management Tech Support Data Breach Chatbots Google Play Meta Amazon Education Videos Electronic Health Records Screen Reader Monitors Distributed Denial of Service Wasting Time Computing Infrastructure Service Level Agreement Websites Trend Micro Identity Security Cameras Mobile Computing Outsource IT Environment Media Search Bookmark Software as a Service Competition Smart Tech Electronic Medical Records Managing Costs Alerts Best Practice SharePoint Download eCommerce SSID Small Businesses Buisness Displays IT solutions Lenovo Browsers Surveillance Connectivity Writing Virtual Assistant Legal Break Fix Virtual Reality Virtual Machine User Business Growth Upload Server Management Reviews Social Network Private Cloud Medical IT Multi-Factor Security Outsourcing Superfish Cortana Identity Theft Development IoT Transportation Dark Web Twitter Hypervisor Alt Codes Workplace IP Address Trends Shopping Customer Resource management Error Optimization Regulations PowerPoint Google Calendar Hiring/Firing Downtime Hosted Solution Paperless Data Analysis Star Wars Social Engineering Employer/Employee Relationships Microsoft Excel Remote Computing Recovery Staff Navigation Typing Co-managed IT PCI DSS Gamification

Blog Archive