facebook linkedin twitter

How Word Got Around in a Galaxy Far, Far Away

How Word Got Around in a Galaxy Far, Far Away

Science fiction is filled with incredible technology, especially in terms of how the characters communicate. This is especially true in the epic space opera Star Wars. Fortunately for viewers like you and me, some of the communication devices and technologies used a long time ago, in a galaxy far, far away, may not be so far off.

The Bantha in the Room
Admittedly, a lot of the technology in Star Wars seems pretty consistent throughout the series. From the time that we meet the young Anakin Skywalker to the time his grandson Kylo Ren appears on screen (a span of 66 years or so), the devices and processes used by the characters seems to remain largely unchanged. This is especially true of the communications devices used throughout the series.

This leaves us with a considerable question that remains unanswered - why is it that nothing seems to advance in the Star Wars universe, including their communications technology?

There are a few possible answers to this.

First, consider the frame of reference that we, as an audience, are given throughout the story. Star Wars is focused around, well, a civil war, with the majority of its other settings being desolate deserts, ice planets, and swamps. None of these places are ideal for technological innovation. Therefore, we have a limited scope of perception that we need to take into consideration. It is entirely possible that, while we were focused on the battlefields, the more well-off planets were demonstrating more advanced and aesthetically pleasing consumer tech - and that this tech simply didn’t survive the oppressive regime that the story sees rise.

Of course, there is a second possibility. Turning back to our experience, consider the wheel. Despite it being one of the oldest pieces of technology ever developed by humankind, it has remained fundamentally unchanged in design. After all, it works, doesn’t it?

The same could perhaps be said of the communications technology utilized by the characters of Star Wars, especially considering the wartime setting that the story takes place in. As long as the technology works, the aesthetics of it are irrelevant.

How Word Travels
There is also no shortage of tools in Star Wars that allow the characters to communicate with one another, and while the concepts aren’t perfect, they are still fascinating to consider.

Consider for a moment one of the biggest gaps in communication that can be seen in our world: language. Language barriers are a non-issue in Star Wars, as long as you have a protocol droid alongside you. As C-3PO is only too willing to announce, it is knowledgeable in over six million languages. This makes its translation skills unmatched.

Furthermore, R2-D2 and many other droids in the series demonstrated a universal connector port that allowed for access to more or less any computer in the galaxy. This suggests a capacity for universal connections that all follow a similar protocol, the appeal of which would not be lost on anyone who has dealt with keeping chargers and connector cables for different devices organized.

Furthermore, there’s another communications technology in Star Wars that has long been admired, the existence of holograms. Not only could these be used live to allow face-to-face communication, they could be used to record messages for future reference and pleas for Obi-Wan Kenobi’s help. The HoloNet allowed these messages to be transmitted across the galaxy at speeds that apparently rivaled those of light, enabling communications between entire groups of people (or Jedi Councils) to be live-streamed on another level than what we see today.

However, that may soon change. MIT Media Lab researchers have theorized about Internet-transmitted holograms that could be used to enable telecommuting, via a device that just so happens to be about R2-D2-sized.

While we have a long way to go before we can communicate the way that they did so long ago, so far away, the technology we have at our disposal now shows promise. What kinds of communications would you like to see jump from Star Wars to the business world? Share your thoughts in the comments! May the fourth be with you!

A Physical Backup Has a Place in Your Overall Stra...
Tip of the Week: 3 Pieces of Software that Read th...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Saving Money Network Security Email Malware IT Services Hosted Solutions Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices Smartphones User Tips Gadgets Business Continuity Innovation Disaster Recovery Social Media Microsoft Office Android VoIP Mobile Office Virtualization Network Data Backup Mobile Device Management Collaboration Communication Server Smartphone Productivity Miscellaneous Data Recovery Ransomware Tech Term Windows 10 Upgrade Unified Threat Management Windows IT Support communications Passwords Holiday Facebook Remote Monitoring Operating System Vendor Management Managed IT services Apps Cybersecurity BYOD Mobile Computing Remote Computing Phishing BDR WiFi Users The Internet of Things Automation Mobile Device Analytics Marketing Apple Outsourced IT Firewall History Internet of Things Browser Save Money Alert Artificial Intelligence Data Management Managed IT Services App IT Consultant Encryption Big data Spam Content Filtering Health Going Green Bandwidth Gmail Bring Your Own Device Office Antivirus Maintenance Printer Tech Support Cloud Computing Office 365 Virus Budget Lithium-ion Battery Best Practice Information Technology Windows 10 Hiring/Firing Two-factor Authentication Hard Drives Managed IT Saving Time Help Desk Cybercrime Wireless Technology Windows 8 Outlook Search Cost Management Business Technology Money Document Management IBM Phone System Computers VPN Training Recovery Travel Employer-Employee Relationship Access Control Update Hacking Blockchain Save Time SaaS Information Law Enforcement Customer Service Proactive IT Running Cable Compliance Healthcare Government Data storage Website Twitter Intranet Applications Education Administration Managed Service It Management Networking Hard Drive Legal Risk Management Mobility Regulations Humor Sports Digital Payment Scam iPhone Disaster Computing Router Downtime Hosted Solution User End of Support Data Breach Robot Comparison Tablet Excel Social Digital Securty Project Management Company Culture Websites Computer Repair Wireless Customer Relationship Management Social Networking Current Events Machine Learning DDoS Solid State Drive Augmented Reality Telephone Systems Black Market Flexibility PowerPoint Cryptocurrency Word Laptop Business Growth File Sharing Fax Server Value Password Cortana Data Security Google Maps Hacker Patch Management Paperless Office Social Engineering Avoiding Downtime Business Intelligence Data Loss Chromebook USB Monitoring Unified Communications Settings Presentation Redundancy Computing Infrastructure Hack Computer Accessories Pain Points How To Download Virtual Desktop Evernote Management Private Cloud Specifications Safety Trending IT service Mouse Telephony Vulnerabilities Documents Microchip Taxes Heating/Cooling Entertainment Start Menu Tech Terms Mobile Technology Statistics Co-managed IT Vendor Storage Bluetooth Programming User Error Distributed Denial of Service Gaming Console Software as a Service Network Congestion Public Cloud Uninterrupted Power Supply Webcam Google Docs Retail Text Messaging eWaste Experience Bitcoin Streaming Media Lifestyle Identity Theft Monitors Data Protection Cleaning Office Tips Conferencing Net Neutrality Politics Virtual Reality Chrome Emails YouTube Automobile Inbound Marketing Processors Motion Sickness Modem Leadership Assessment SharePoint Micrsooft Business Managemenet Scalability Proxy Server Adminstration Business Owner Pirating Information UTM Content Management Content Google Calendar Drones Legislation Error Messenger Electronic Medical Records Tracking IP Address Tip of the week IT Plan Enterprise Resource Planning Get More Done Term Accountants online Currency A.I. Printer Server Rental Service Meetings Application Touchscreen News email scam Addiction Turn Key Directions VoIP Human Resources Web Server SSID Consultation Dark Web Cabling Knowledge Permissions Multi-factor Authentication Language Trojan Technology Tips Wireless Headphones LinkedIn Telephone Organize Books Health IT Workers Virtual Assistant Migration Connected Devices Wi-Fi Administrator Processing Music Equifax Fleet Tracking Supercomputer Upselling Digital Signature Fake News switches Writing Network Management Managed IT Service Audit Teamwork Data Warehousing Upgrades Skype Bookmark Worker Video Surveillance Device security Archive MSP Saving ZTime Access Nanotechnology Social Network Reading Samsung Emergency Hard Drive Disposal LiFi Desktop Finance Google Play PDF Computer Care Startup Asset Tracking Webinar Employer Employee Relationship Microsoft Excel Business Cards Point of Contact Service Level Agreement G Suite Processor Hacks Physical Security Harddrive Best Available Keyboard Google Drive Windows Server 2008 Unified Threat Management Deep Learning Backup and Disaster Recovery Browsers Licensing Debate Work/Life Balance Username Security Cameras Spyware Mobile Payment Screen Reader Customer Resource management Relocation User Tip Tablets GPS Domains Vulnerability Visible Light Communication Memory Gamification Banking Botnet Electricity Printing Recycling Smart Tech Distribution Public Speaking IT consulting Piracy Upload Analytic Sync Navigation External Harddrive Notifications CCTV Shortcut Windows 7 Fiber-Optic Database Product Reviews Data Analysis HTML Business Metrics Computer Malfunction GDPR Thin CLient Entrepreneur cache Television CIO Telephone System Reliable Computing 3D Troubleshooting Ebay Advertising Mobile Security Flash Read Best Practives Smart Phones Environment WannaCry Downloads Staffing Google Wallet Multi-Factor Security Cost HIPAA Windows XP Software License Trends In Internet of Things Tech Device Management Devices Competition Time Management Freedom of Information Fraud Displays Tactics Microserver Fileless Malware Electronic Payment Corporate Profile Society CrashOverride Capital Cooperation Productuvuty Medical IT 3D Printing Printers Managing Stress Regulation