Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Ransomware Workplace Strategy Mobile Device Microsoft Quick Tips Small Business Passwords Backup Saving Money Cybersecurity Communication Data Backup Smartphone Managed Service Android Productivity Upgrade VoIP Business Management Smartphones Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Holiday Miscellaneous Gadgets Cloud Computing Information Covid-19 Remote Work Training Server Managed Service Provider Outsourced IT Employee/Employer Relationship Compliance Encryption Spam Office Windows 10 IT Support Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Chrome Managed Services Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking App Employer-Employee Relationship BYOD Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR HIPAA Computing Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services 2FA Big Data Operating System Router Customer Service Display Printer Paperless Office Infrastructure Monitoring Document Management Remote Workers Firewall Telephone Scam Data loss Windows 11 The Internet of Things Cooperation Free Resource Project Management Windows 7 Excel Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Physical Security Cryptocurrency Modem Hacking User Tip Processor Data Privacy Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Word Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Supply Chain Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN Employees Integration Username Human Resources Managing Costs Cables Point of Sale eCommerce 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Experience Virtual Assistant User Bitcoin Network Management Google Apps Running Cable Tech Support IT Technicians Virtual Machine IT Maintenance Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Business Intelligence Tactics Development Hotspot Transportation Windows 8 IP Address Shortcuts Laptop Websites Mirgation Hypervisor Drones Shopping Ransmoware Nanotechnology Optimization PowerPoint SharePoint Vendors Addiction Electronic Medical Records Language Employer/Employee Relationships Halloween Chatbots Recovery Navigation Management PCI DSS Be Proactive Lenovo Gig Economy Workforce Screen Reader Hard Drives Writing Distributed Denial of Service Threats Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Scary Stories Private Cloud Identity Evernote Hacks Server Management Regulations Compliance Workplace Strategies Superfish Bookmark Meta Identity Theft Smart Tech Memes Refrigeration Fun Amazon Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Error History Financial Data Lithium-ion battery Browsers Smartwatch Outsource IT Education Connectivity IT Social Engineering Break Fix Entrepreneur Environment Upload Procurement Media Remote Computing Azure Cyber security Multi-Factor Security Tech Mobile Computing Social Network Telework CES Small Businesses Tablet IoT Communitications Undo Search Dark Web Displays Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Legal Data Analysis Outsourcing IT solutions Star Wars IT Assessment How To Microsoft Excel Business Growth Gamification Flexibility Notifications Staff Value Travel Social Networking Application Legislation Organization Workplace Techology Fileless Malware Digital Security Cameras Hiring/Firing Google Maps Smart Devices Cortana Alt Codes Content Remote Working IBM Paperless Wearable Technology Memory Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Health IT Co-managed IT Unified Threat Management Directions Videos Technology Care Hosted Solution Assessment Electronic Health Records Permissions Typing Business Communications Wasting Time Scams Trend Micro Network Congestion Specifications Security Cameras Google Drive User Error Microchip Hybrid Work Internet Exlporer Software as a Service Competition Knowledge Fraud

Blog Archive