Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In the Near Future, Light Bulbs Will Transmit Data

b2ap3_thumbnail_lifi_400.jpgYour business’s wireless Internet connection is one of its most valuable assets, and without it, your operations would surely suffer. Your wireless technology, like smartphones, tablets, laptops, and even your network depend on it in order to function properly. WiFi is known to be pretty inconvenient at times due to questionable connections and security, but a new technology wants to change all of that: Li-Fi, wireless Internet connections delivered by special light bulbs.

Li-Fi started out as being nothing more than a theory, but there has been steady progress made over the past few years. It’s been tested in a real-world environment, and it’s showing that it can definitely be a viable wireless Internet technology. When tested, Li-Fi transferred data at speeds of around 1GB/second. As explained by ScienceAlert:

The technology uses Visible Light Communication (VLC), a medium that uses visible light between 400 and 800 terahertz (THz). It works basically like an incredibly advanced form of Morse code - just like switching a torch on and off according to a certain pattern can relay a secret message, flicking an LED on and off at extreme speeds can be used to write and transmit things in binary code.

Li-Fi was created by Professor Harald Haas, who claims that Li-Fi resolves four of the main problems that most businesses have with normal wireless communications:

  • Capacity: The way that WiFi currently functions is through the use of electromagnetic waves, like radio waves, which are particularly limited in scope and range. When most of society needs access to wireless Internet, due to the limited amount of space on the spectrum, these restrictions will ultimately hold WiFi back. In comparison, the light used by Li-Fi is capable of traveling at a much greater frequency, which makes it about 10,000 times faster than traditional WiFi.
  • Efficiency: Data transfer occurs via base stations as per the current deployment model, and these base stations aren’t energy efficient. About five percent of the energy is used to transfer the data, while the rest is devoted to maintaining the temperature of the base station. In terms of overall financial efficiency, data transferred via light eliminates the cost of data transmission. Considering how necessary light bulbs are around the world, it would be a simple transition process. Since the infrastructure already exists, it could be as simple as replacing normal light bulbs with special Li-Fi LED bulbs.
  • Availability: WiFi isn’t available everywhere; at least, not yet. In other places, it can’t be used, like hospitals and airplanes. Visible light surrounds all of us on a daily basis, so it’s not really a question of “if” a Li-Fi connection will be available, but “how” it will be implemented.
  • Security: Who can forget the major cause for concern that is security? Wireless signals delivered by radio waves can potentially breach walls and extend into the outside world. Light can be restricted to certain rooms, homes, and buildings, so it’s easier to keep secure.

Haas is pretty set on his belief that Li-Fi can solve the world’s high-speed data transfer problems, but what do you think? Let us know in the comments if you think this is a bright idea!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Managed Service Ransomware AI Users Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Training Compliance Covid-19 Gadgets Cloud Computing Server IT Support Managed Service Provider Outsourced IT Remote Work Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Vendor Business Technology Bandwidth Windows 10 Virtualization Blockchain Two-factor Authentication Managed Services Mobile Office Data Security Apps Tip of the week Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Computing Physical Security Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services How To BDR HIPAA Router Virtual Private Network Risk Management 2FA Computers Health Help Desk Analytics Website Office Tips Augmented Reality Healthcare Retail Storage Bring Your Own Device Big Data Operating System Customer Service Windows 11 Display Printer Paperless Office Infrastructure Excel Monitoring Remote Workers Document Management Managed IT Service Firewall Telephone Scam Free Resource Project Management Data loss Windows 7 The Internet of Things Cooperation Microsoft 365 Social Going Green Patch Management Solutions Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime VPN YouTube Meetings Holidays Cryptocurrency Hacking User Tip Modem Presentation Computer Repair Mobile Security Data Storage Processor Supply Chain Video Conferencing Virtual Desktop Data storage Managed Services Provider LiFi Wireless Technology Virtual Machines Professional Services Smart Technology Outlook Machine Learning Money Saving Time Humor Word iPhone Maintenance Downloads Antivirus Vulnerabilities Sports Mouse Data Privacy Licensing Images 101 Safety Administration Entertainment Multi-Factor Authentication Mobility Robot Telephone System Cost Management Employees Settings Wireless Printing Integration Content Filtering IT Management Customer Relationship Management Network Congestion Specifications Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Internet Exlporer Competition Media Knowledge Fraud Google Drive User Error Microchip Reviews Username Medical IT 5G Black Friday Development Transportation Small Businesses Point of Sale Hypervisor Displays Unified Communications Database Experience Google Docs Shopping Optimization Bitcoin Network Management PowerPoint Running Cable Tech Support IT Technicians User Monitors Cyber Monday Google Wallet Proxy Server Employer/Employee Relationships Outsourcing Cookies Tactics Navigation Hotspot PCI DSS Gig Economy Windows 8 IP Address Workplace Laptop Websites Mirgation Nanotechnology Internet Service Provider Drones Teamwork Hiring/Firing SharePoint Addiction Evernote Paperless Electronic Medical Records Language Regulations Compliance Memes Management Co-managed IT Halloween Chatbots Recovery Screen Reader Hard Drives Writing Distributed Denial of Service Net Neutrality Lenovo SQL Server Technology Care History Service Level Agreement Domains Business Communications Virtual Reality Computing Infrastructure Financial Data Smartwatch IT Hacks Server Management Scams Scary Stories Private Cloud Identity Identity Theft Smart Tech Refrigeration Fun Procurement Superfish Bookmark Azure Hybrid Work Cyber security Deep Learning Download Public Speaking Tech Human Resources Twitter Alerts Telework CES Communitications Lithium-ion battery Cables Error Education Connectivity Social Engineering Break Fix Entrepreneur Supply Chain Management Browsers Upload Term Google Apps Remote Computing FinTech Multi-Factor Security IT Assessment Mobile Computing Social Network IT Maintenance Tablet IoT Undo Search Dark Web Flexibility Value Business Intelligence Organization Best Practice Trends Shortcuts Alert Dark Data Google Calendar Digital Security Cameras Smart Devices Managed IT Customer Resource management Ransmoware Buisness File Sharing Regulations Memory Vendors IT solutions Star Wars How To Microsoft Excel Remote Working Legal Data Analysis Data Breach Business Growth Gamification Google Play Be Proactive Notifications Staff Legislation Videos Electronic Health Records Workforce Travel Social Networking Application Wasting Time Threats Google Maps Cortana Techology Fileless Malware Trend Micro Alt Codes Content IBM Security Cameras Workplace Strategies Wearable Technology Comparison Software as a Service Health IT Meta Downtime Unified Threat Management Motherboard Managing Costs Amazon Hosted Solution Assessment Permissions Unified Threat Management Directions eCommerce Typing SSID

Blog Archive