Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Passwords Cybersecurity Communication Data Backup Smartphone Android Data Recovery AI Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Information Automation Facebook Miscellaneous Artificial Intelligence Cloud Computing Training Gadgets Covid-19 Managed Service Provider Compliance Remote Work Server Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Blockchain Windows 10 Wi-Fi Business Technology Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Apps Data Security BYOD App Mobile Device Management Gmail Managed Services Voice over Internet Protocol WiFi Tip of the week Employer-Employee Relationship Chrome Networking Budget Apple Marketing HIPAA Access Control Computing Applications Information Technology Office 365 Conferencing How To BDR Hacker Avoiding Downtime Website Virtual Private Network Operating System Router Health Healthcare Risk Management 2FA Big Data Retail Help Desk Analytics Office Tips Augmented Reality Managed IT Services Computers Storage Password Bring Your Own Device Vendor Management Physical Security Going Green Display Firewall Printer Paperless Office Cybercrime Infrastructure Remote Workers The Internet of Things Windows 11 Document Management Monitoring Social Excel Free Resource Project Management Scam Windows 7 Data loss Microsoft 365 Customer Service Telephone Solutions Patch Management Save Money Cooperation Remote Monitoring Vulnerability End of Support IT Management Holidays VPN Meetings Telephone System Cost Management Word Data Storage Video Conferencing Settings Computer Repair Printing Managed Services Provider Wireless Virtual Machines Content Filtering Professional Services Safety YouTube User Tip Modem Processor Cryptocurrency Mobile Security Machine Learning iPhone Supply Chain Virtual Desktop LiFi Smart Technology Vulnerabilities Data storage Maintenance Antivirus Outlook Saving Time Images 101 Customer Relationship Management Mobility Money Multi-Factor Authentication Managed IT Service Humor Downloads Hacking Presentation Sports Licensing Robot Mouse Employees Data Privacy Integration Entertainment Wireless Technology Administration Best Practice Star Wars Surveillance Unified Threat Management Microsoft Excel Shortcuts Virtual Assistant Data Analysis Gamification Recovery Buisness Staff Ransmoware Virtual Machine Legislation Medical IT Network Congestion Legal Hard Drives Reviews IT solutions Social Networking Vendors Business Growth Development User Error Be Proactive Transportation Fileless Malware Domains Content Wearable Technology Workforce Hypervisor Threats Optimization Cortana Comparison PowerPoint Point of Sale Health IT Refrigeration Shopping Motherboard Public Speaking Alt Codes Assessment Permissions Workplace Strategies Employer/Employee Relationships Directions Navigation Tech Support Lithium-ion battery PCI DSS Downtime Meta Network Management Entrepreneur Amazon Specifications Monitors Gig Economy Hosted Solution Typing Internet Exlporer Internet Service Provider Fraud Teamwork Microchip Evernote Websites Username Regulations Compliance Outsource IT Environment Memes Knowledge Black Friday Media Google Drive Undo Database Net Neutrality SharePoint SQL Server Electronic Medical Records Financial Data IT Technicians Small Businesses History 5G Cookies Displays IT Experience Lenovo Cyber Monday Writing Google Docs Proxy Server Smartwatch Unified Communications Bitcoin Tactics Procurement Running Cable Hotspot Azure Virtual Reality Server Management Tech Private Cloud Google Wallet Application Telework Mirgation Outsourcing Cyber security Nanotechnology Communitications Superfish Identity Theft CES Twitter IBM Windows 8 Addiction Supply Chain Management Laptop Language Workplace Term Error Drones Management FinTech Chatbots Hiring/Firing Screen Reader IT Assessment Distributed Denial of Service Paperless Social Engineering Remote Computing Service Level Agreement Flexibility Halloween Computing Infrastructure Co-managed IT Value Organization Identity Technology Care Digital Security Cameras Smart Tech Smart Devices Business Communications Tablet Bookmark Competition Alert Hacks Download Remote Working Scary Stories Alerts Scams Memory Data Breach Fun Managed IT Google Play File Sharing Dark Data Hybrid Work Videos Deep Learning Connectivity Electronic Health Records Break Fix Human Resources How To Browsers Notifications Upload User Cables Wasting Time Trend Micro Multi-Factor Security Security Cameras Travel Social Network Education IoT Software as a Service Techology Dark Web Google Apps Google Maps IP Address Mobile Computing Trends IT Maintenance Managing Costs eCommerce Search Google Calendar SSID Unified Threat Management Customer Resource management Regulations Business Intelligence

Blog Archive