Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Covid-19 Cloud Computing Miscellaneous Holiday Gadgets Training Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Government Business Continuity Wi-Fi Blockchain Windows 10 Virtualization Bandwidth Business Technology Mobile Office Two-factor Authentication Data Security Vendor Apps Mobile Device Management Networking Gmail Chrome BYOD Budget Employer-Employee Relationship Apple App Tip of the week Managed Services Voice over Internet Protocol Computing Marketing Information Technology How To BDR Office 365 HIPAA Applications WiFi Access Control Conferencing Hacker Avoiding Downtime Website Risk Management Managed IT Services Router Analytics Office Tips Augmented Reality Big Data Storage Password Bring Your Own Device Virtual Private Network Help Desk Health Computers 2FA Operating System Retail Healthcare Cooperation Scam Data loss Free Resource Project Management Firewall Windows 7 Microsoft 365 Patch Management Save Money The Internet of Things Remote Monitoring Solutions Vulnerability End of Support Vendor Management Social Physical Security Monitoring Display Printer Paperless Office Infrastructure Windows 11 Customer Service Going Green Telephone Document Management Remote Workers Excel Cybercrime Maintenance iPhone YouTube Antivirus Cryptocurrency Word Vulnerabilities Telephone System Cost Management Images 101 Virtual Desktop LiFi Data storage Multi-Factor Authentication Mobility Data Privacy Safety Robot Outlook Money Modem User Tip Humor Processor Employees Mobile Security IT Management Integration VPN Meetings Sports Mouse Smart Technology Computer Repair Holidays Administration Customer Relationship Management Saving Time Data Storage Video Conferencing Managed Services Provider Managed IT Service Hacking Virtual Machines Professional Services Presentation Downloads Supply Chain Machine Learning Settings Wireless Technology Wireless Printing Licensing Content Filtering Entertainment Smartwatch Twitter Trends IT Paperless Google Calendar Co-managed IT Knowledge Recovery Error Customer Resource management Procurement Google Drive Regulations Azure Social Engineering Star Wars Cyber security Microsoft Excel Tech Technology Care Hard Drives Data Analysis Telework Domains 5G CES Remote Computing Gamification Communitications Staff Business Communications Unified Communications Legislation Scams Experience Supply Chain Management Google Docs Social Networking Bitcoin Term Hybrid Work Running Cable Refrigeration Tablet Fileless Malware FinTech Human Resources Public Speaking Alert Content IT Assessment Google Wallet Wearable Technology Comparison Cables Lithium-ion battery Managed IT File Sharing Health IT Flexibility Dark Data Motherboard Value Directions Organization Entrepreneur How To Assessment Windows 8 Permissions Laptop Google Apps Digital Security Cameras Notifications Smart Devices Drones Memory Specifications IT Maintenance Travel Remote Working Microchip Internet Exlporer Data Breach Fraud Google Play Business Intelligence Halloween Techology Undo Google Maps Shortcuts Videos Username Electronic Health Records Wasting Time Black Friday Ransmoware Unified Threat Management Database Trend Micro Hacks Security Cameras Vendors Scary Stories Unified Threat Management Be Proactive Fun Software as a Service IT Technicians Cookies Managing Costs Deep Learning Cyber Monday Workforce Application Proxy Server Network Congestion Tactics eCommerce Hotspot SSID Threats User Error Workplace Strategies IBM Surveillance Mirgation Virtual Assistant Education Nanotechnology Virtual Machine Meta Point of Sale Reviews Addiction Mobile Computing Language Medical IT Amazon Search Network Management Tech Support Management Development Chatbots Transportation Monitors Screen Reader Hypervisor Best Practice Distributed Denial of Service Outsource IT Shopping Service Level Agreement Optimization Computing Infrastructure PowerPoint Environment Buisness Media Competition IT solutions Websites Legal Identity Employer/Employee Relationships Smart Tech Business Growth Navigation Small Businesses Bookmark PCI DSS Gig Economy Electronic Medical Records Download Alerts Displays SharePoint Cortana User Internet Service Provider Teamwork Writing Connectivity Alt Codes Break Fix Evernote Outsourcing Lenovo Browsers Regulations Compliance Virtual Reality Upload Memes Downtime Hosted Solution Multi-Factor Security Workplace IP Address Server Management Private Cloud Social Network Net Neutrality SQL Server IoT History Typing Dark Web Hiring/Firing Superfish Identity Theft Financial Data

Blog Archive