Network Synergy Blog

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

I am Fluent In Over Six Million Forms of Communication...
Connectivity is performing a complete overhaul on the way people interact. One way people are able to connect to each other, and to machines, is through the use of language. In Star Wars, no characters most exemplify the enhanced communications capabilities of our new digital frontier than the droids. C-3PO repeatedly reminds its companions that its “fluent in over six million forms of communication,” while R2-D2 repeatedly uses its ability to communicate with other machines to the benefit of its rebel cohorts.

C-3PO is a protocol droid. When Luke Skywalker gifts the two droids (C-3PO and R2-D2) to Jabba the Hutt in Return of the Jedi, they are fitted with restraining bolts and used for utility: C-3PO as Jabba’s main interpreter, R2-D2 as a rolling drink server. While C-3PO’s role, from a mess of wires in The Phantom Menace, to its cameos in Disney’s subsequent sequels, hasn’t changed much, its ability to communicate both with humans (humanoids) and machines provides the rebels with a useful resource.

Today, manufactures have created technology that speaks to other technology. We call it the Internet of Things, but really it is the next step in the use of technology for human utility. Like C-3PO, today’s connected machines communicate with other machines to get them to perform tasks that humans traditionally have had to do. This automation is at the center of many of today’s most innovative technologies.

R2-D2, too, is well equipped in its ability to communicate. When it fixed the hyperdrive on the Millennium Falcon, it was a form of utility computing. Today’s smart technology solves problems and pushes notifications to a control hub of some sort (typically a handheld smartphone) to make human lives easier. Since there aren’t a lot of people that understand the beep-beep-boop of R2-D2, they also translate the binary information into easily understandable updates that are pushed to our devices.

(Note: I use the pronoun “it” because these are machines, not men, a mistake that many fans of the movies would argue against, but this leads us to our next point…)

How Artificial Are Droid’s Intelligence?
Clearly, any consideration of this makes this is a trick question. Their sentience (and the fact that they both actually had humans at the controls of their characters) portray them as relatable beings. The droid duo (and later BB-8 and K-2SO) are largely used as high-brow comic relief in a story about civil war and a family that has been relentlessly torn apart, but what is their true function in the context of the universe?

The smaller droids are astromech droids. Having been designed to be utilized on a starfighter, diagnosing (and fixing) mechanical and computer issues in what are very complex machines. There is a reason that R2-D2 is able to fix a problem that both Chewbacca and Han Solo couldn’t fix, in seconds. It’s because it has the ability to learn how to adjust to situations over time. Throughout the course of the movies, it’s evident that these droids learn and are able to solve problems quickly, much to the benefit to the humans (and humanoids) in the story.

With the big data boom and the enhanced A.I. systems now being put into products, they are now able to make adjustments on the fly. While today’s systems may not be as advanced as the astromech droids, their utility is undeniable. From the smart fridge that tells you you are out of milk, to the vacuum cleaner that maps your home so that it doesn’t get stuck, to the security system that provides users real-time monitoring through an app on their phone, the Internet of Things is automating systems for human utility.

The Twenty-First Century Force
If there is one definable characteristic of the Star Wars movies, it is the use of the Force. The Force as described by Wookieepedia is: “ energy field that connected everything in the galaxy and was created by all living entities.” The Force, while being kind of a mystical, biological concept, demonstrates ubiquity quite nicely. For decades, the Force has been compared to Duct Tape: it has a light side, a dark side, and it holds the whole universe together, but as it is explained in The Phantom Menace, there are things called midichlorians that live in the cells of all living things that connect everything to everything else.

This kind of ubiquity is the goal of some. Nanotechnology engineers are creating smaller and smaller machines, and with the technology to alter the molecular makeup for utility, it is only a matter of time before the technology will be available to make connected machines that work to alter matter at its foundations. This level of ubiquity isn’t imminent, but you could see machines manufactured by the billions, fighting cancer, making materials stronger or more flexible, and customizable through the use of a force of human making.

Star Wars gave people inspiration to imagine a better world, and much of that imagination has been fulfilled. Do you think the Internet of Things is important? Do you see it becoming something that allows for fundamental changes to the world around us? Leave your thoughts in the comments below, and May the fourth be with you.

How to Go About a Technology Needs Assessment
Tech Term: Bandwidth Defined

Comments 1

Encesequar85 John on Sunday, 30 September 2018 11:43

Statistics are the best ways to find the exact figure or number about any specific observation. Observe these statistics to find the best and accurate result against your finding and observation. The review of resume writing services always shares the informative content with us.

Statistics are the best ways to find the exact figure or number about any specific observation. Observe these statistics to find the best and accurate result against your finding and observation. The [url=]review of resume writing services[/url] always shares the informative content with us.
Already Registered? Login Here
Monday, October 22, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Software Food Shortcut Help Desk Data storage Battery Environment Personal Information Health Blockchain Permissions IT Solutions Operating System Laptop IP Address Hacking Computer Accessories Outsourced IT Heating/Cooling Solid State Drive Bookmarks Trainging Service-based Business Identity Virtual Reality Cameras Technology Technology Tips Tablet Best Practice Cabling Experience Notifications Deep Learning Customer Service Samsung Technology Laws Recycling Servers Modem The Internet of Things Maintenance Data Management Scam Telephony Hard Disk Drive Productivity Windows 10 G Suite Disaster Recovery Data Security Mobile Administration Gadgets Mouse Fun Microsoft Office Computer Care GPS Mail Merge Cyberattacks Administrator Programming E-Commerce IT Support Hotspot Macro Artificial Intelligence IT Services Data Loss Tech Support Trending LiFi Infrastructure Miscellaneous Hardware Business Growth Efficiency Server Management Unified Communications Downtime Staff Facebook Email IoT Tip of the week Backup SharePoint Antivirus Content Filtering Remote Monitoring Presentation Multi-Factor Security App Quick Tips Upgrade Consumers Cybercrime Mobile Computing Apple iPhone Managed IT services Business Technology Finance Upgrades Server Mobile Data Remote Computing Business Management Marketing Saving Money Business Managed Service Mobile Devices Business Computing Politics Big Data Redundancy Virtual Private Network Dark Web Alerts Techology Computers Cloud Computing Router Smart Technology Competition IT Support Collaboration IT Technicians Browser Outlook Data Breach Work/Life Balance HIPAA Ransomware Bitcoin LinkedIn Wearable Technology eBay Taxes Phone System Cyber Monday Hosted Solutions Cortana Value Android Search Data Recovery Software Tips Workplace Tips Documents Vulnerability Managed Service Provider Troubleshooting Network Congratulations Unified Threat Management Motherboard Cybersecurity Piracy Computer Repair eWaste Budget Emoji Scary Stories Saving Time Private Cloud Law Firm IT Chromebook Digital Internet of Things Current Events Money Analyitcs Passwords Wires Domains WPA3 Co-managed IT Business Intelligence People Point of Sale Error Small Business Microsoft Excel Software as a Service Smartphones Cables Inbound Marketing Secruity Firefox Online Currency IT Consultant Data Remote Monitoring and Management Display Business Continuity Windows 8 Tech Term Smart Tech Lenovo Assessment VoIP Botnet Data Backup Development Mirgation Encryption Address Tip of the Week Holiday Streaming Media Phishing Information Conferencing Connectivity Statistics Best Available Virus Cleaning Licensing Debate Mobile Office Cookies Downloads Gaming Console Information Technology Memory Entrepreneur Break Fix Public Speaking How To Two-factor Authentication Files Tutorials Thank You Mobile Device Web Server Communication 3D Hard Drives Paperless Office Storage Education Virtual Desktop Customer Relationship Management Proactive Google Wallet Chatbots Webinar Social Media Language Physical Security Managed IT Services Staffing Automobile Webcam Google Drive Microsoft 3D Printing Mobile Technology Meetings Network Management Social BYOD Uninterrupted Power Supply Machine Learning Hosted Solution Lithium-ion Battery Settings Malware Identity Theft Printer Utility Computing Government Chrome Time Management IT budget Gmail Training Managing Stress Refrigeration Google Calendar User Specifications Automation Mobility Tracking USB Network Congestion Processors Features Undo Disaster Crowdfunding Electronic Health Records User Error Hard Drive Applications Monitoring Motion sickness File Sharing Apps Websites Computing Infrastructure Innovation Hackers Spyware Website Patch Management Hiring/Firing Disaster Resistance Crowdsourcing Going Green Alt Codes Tip of the Work Internet Exlporer Network Security Windows Drones Bluetooth Fraud Networking Asset Tracking VPN Consulting History Work Station Sports Cooperation Productivity Wi-Fi Screen Reader Start Menu Backups Legal Regulations Users Vulnerabilities Hacks Smartphone Computing PDF Security Managed IT Service Intranet Company Culture CrashOverride Sync Save Money SaaS Gadget Windows 10 Printing Managed Services Provider How To Office 365 Google Analytics Monitors CIO Net Neutrality Employee-Employer Relationship Social Networking 5G Wireless Healthcare Proactive IT Avoiding Downtime Internet Enterprise Content Management Humor Supercomputer Google Docs Vendor Management Digital Payment Management Printers Telephone Systems Virtualization Corporate Profile Business Owner Leadership Data Warehousing WiFi IBM Travel Safety Google Writing Typing Print Server Read Only PowerPoint Black Friday Firewall Wireless Technology Unified Threat Management Flexibility CCTV Digital Signature End of Support Document Management Legislation Cloud Mobile Security PC Care Knowledge Unsupported Software Consultation Compliance Managed IT Augmented Reality Office Fleet Tracking Remote Workers Application Windows 8.1 Update Electronic Medical Records IT service Relocation Excel Google Maps BDR Text Messaging Best Practices communications Hacker IT Consulting Access Control Nanotechnology User Tips Comparison Logs Instant Messaging MSP Geography Bring Your Own Device Twitter YouTube Bandwidth Risk Management Regulation Social Engineering Law Enforcement Employer-Employee Relationship Buisness Computer Black Market Halloween Retail Office Tips Skype Favorites OneNote Distributed Denial of Service Alert Enterprise Resource Planning Star Wars Remote Support Identities Operations Project Management Cache Migration Charger Superfish Running Cable High-Speed Internet Spam Recovery Touchscreen Video Surveillance Mobile Device Management Privacy Cryptocurrency IT Management Save Time Public Cloud Cost Management Word Fax Server Robot Password Scheduling

      Latest Blogs

      Once thought to just be a cool feature of the Internet--or the entirety of the Internet to your Great Aunt Maddie--instant messaging has a long history on the web. In fact, one cou...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube