facebook linkedin twitter

How Word Got Around in a Galaxy Far, Far Away

How Word Got Around in a Galaxy Far, Far Away

Science fiction is filled with incredible technology, especially in terms of how the characters communicate. This is especially true in the epic space opera Star Wars. Fortunately for viewers like you and me, some of the communication devices and technologies used a long time ago, in a galaxy far, far away, may not be so far off.

The Bantha in the Room
Admittedly, a lot of the technology in Star Wars seems pretty consistent throughout the series. From the time that we meet the young Anakin Skywalker to the time his grandson Kylo Ren appears on screen (a span of 66 years or so), the devices and processes used by the characters seems to remain largely unchanged. This is especially true of the communications devices used throughout the series.

This leaves us with a considerable question that remains unanswered - why is it that nothing seems to advance in the Star Wars universe, including their communications technology?

There are a few possible answers to this.

First, consider the frame of reference that we, as an audience, are given throughout the story. Star Wars is focused around, well, a civil war, with the majority of its other settings being desolate deserts, ice planets, and swamps. None of these places are ideal for technological innovation. Therefore, we have a limited scope of perception that we need to take into consideration. It is entirely possible that, while we were focused on the battlefields, the more well-off planets were demonstrating more advanced and aesthetically pleasing consumer tech - and that this tech simply didn’t survive the oppressive regime that the story sees rise.

Of course, there is a second possibility. Turning back to our experience, consider the wheel. Despite it being one of the oldest pieces of technology ever developed by humankind, it has remained fundamentally unchanged in design. After all, it works, doesn’t it?

The same could perhaps be said of the communications technology utilized by the characters of Star Wars, especially considering the wartime setting that the story takes place in. As long as the technology works, the aesthetics of it are irrelevant.

How Word Travels
There is also no shortage of tools in Star Wars that allow the characters to communicate with one another, and while the concepts aren’t perfect, they are still fascinating to consider.

Consider for a moment one of the biggest gaps in communication that can be seen in our world: language. Language barriers are a non-issue in Star Wars, as long as you have a protocol droid alongside you. As C-3PO is only too willing to announce, it is knowledgeable in over six million languages. This makes its translation skills unmatched.

Furthermore, R2-D2 and many other droids in the series demonstrated a universal connector port that allowed for access to more or less any computer in the galaxy. This suggests a capacity for universal connections that all follow a similar protocol, the appeal of which would not be lost on anyone who has dealt with keeping chargers and connector cables for different devices organized.

Furthermore, there’s another communications technology in Star Wars that has long been admired, the existence of holograms. Not only could these be used live to allow face-to-face communication, they could be used to record messages for future reference and pleas for Obi-Wan Kenobi’s help. The HoloNet allowed these messages to be transmitted across the galaxy at speeds that apparently rivaled those of light, enabling communications between entire groups of people (or Jedi Councils) to be live-streamed on another level than what we see today.

However, that may soon change. MIT Media Lab researchers have theorized about Internet-transmitted holograms that could be used to enable telecommuting, via a device that just so happens to be about R2-D2-sized.

While we have a long way to go before we can communicate the way that they did so long ago, so far away, the technology we have at our disposal now shows promise. What kinds of communications would you like to see jump from Star Wars to the business world? Share your thoughts in the comments! May the fourth be with you!

A Physical Backup Has a Place in Your Overall Stra...
Tip of the Week: 3 Pieces of Software that Read th...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Smartphones Computer User Tips Gadgets Quick Tips Mobile Devices Business Continuity Disaster Recovery Innovation Mobile Office Virtualization Network Microsoft Office Android Social Media Server Mobile Device Management VoIP Smartphone Collaboration Communication Miscellaneous Windows 10 Upgrade Ransomware Data Recovery Unified Threat Management Windows Data Backup Tech Term Remote Monitoring IT Support Operating System Passwords Mobile Computing BYOD Remote Computing Managed IT services Holiday Vendor Management Cybersecurity Apps Facebook communications WiFi Productivity Marketing BDR The Internet of Things Analytics Firewall History Apple Users Automation Internet of Things Managed IT Services Data Management Phishing Mobile Device Alert Outsourced IT Save Money App IT Consultant Artificial Intelligence Browser Big data Bandwidth Spam Maintenance Content Filtering Encryption Going Green Health Gmail Office Bring Your Own Device Antivirus Search Cybercrime Outlook Windows 8 Managed IT Cost Management Hiring/Firing Hard Drives Printer Tech Support Lithium-ion Battery Virus Best Practice Office 365 Information Technology Budget Two-factor Authentication Help Desk Wireless Technology Employer-Employee Relationship Business Technology Hacking Money Document Management Cloud Computing Computers IBM Saving Time VPN Travel Phone System Training Update Recovery It Management Hard Drive Law Enforcement Save Time Compliance Data storage Humor Proactive IT Running Cable Windows 10 Networking Legal Regulations Intranet Customer Service Education Government SaaS Website Access Control Administration Risk Management File Sharing Robot Word Applications Securty Business Intelligence Data Security Fax Server Digital Payment Downtime Mobility Avoiding Downtime Solid State Drive Patch Management Blockchain Password Cortana Social Engineering Data Loss Flexibility Hacker Black Market Comparison Tablet iPhone Company Culture Laptop Computer Repair Data Breach Business Growth Social Networking Excel User Project Management Customer Relationship Management Information Machine Learning Augmented Reality Twitter Paperless Office Telephone Systems PowerPoint Wireless Current Events DDoS Sports Computing Disaster End of Support Hosted Solution Net Neutrality Bitcoin Identity Theft IT service Chrome Retail Data Protection Lifestyle Google Maps eWaste Router Politics Value Managed Service Virtual Reality Inbound Marketing Emails Bluetooth Computer Accessories Automobile Conferencing Scam Chromebook Pain Points Vendor Cryptocurrency Trending Redundancy Computing Infrastructure Hack Processors USB Mouse How To Monitoring Google Docs Private Cloud Presentation Experience Download Monitors Digital Programming Cleaning Statistics Telephony Virtual Desktop Websites Specifications Safety Management Office Tips Network Congestion Start Menu Tech Terms Taxes Social YouTube Mobile Technology Gaming Console Distributed Denial of Service Documents Vulnerabilities Heating/Cooling Unified Communications Settings Software as a Service Healthcare Streaming Media Webcam User Error Public Cloud Storage Text Messaging Uninterrupted Power Supply Co-managed IT Electricity Printing Best Available Keyboard Username Electronic Medical Records Permissions Language Sync Unified Threat Management Backup and Disaster Recovery CCTV Thin CLient Gamification Device Management Windows 7 3D Domains Ebay Screen Reader Customer Resource management Notifications switches Writing cache Content Management Television Reliable Computing Public Speaking Smart Tech Distribution Dark Web Music Business Managemenet Business Metrics Computer Malfunction Smart Phones Piracy Upload WannaCry Downloads Shortcut HTML Health IT In Internet of Things Fiber-Optic Database Upgrades Entrepreneur Leadership Mobile Security LiFi Time Management online Currency Freedom of Information Best Practives Troubleshooting Adminstration Pirating Information Telephone System Corporate Profile Assessment SharePoint Scalability HIPAA Multi-Factor Security Cost Bookmark Motion Sickness Environment Software License Trends Deep Learning Google Calendar Messenger Microserver Tracking Competition Devices Work/Life Balance LinkedIn Tip of the week Electronic Payment Fraud Tactics Rental Service Meetings UTM Content Visible Light Communication Memory Touchscreen News Business Owner VoIP Enterprise Resource Planning IT consulting Consultation Archive Evernote Get More Done Cabling IP Address Legislation Error Browsers Knowledge Skype Web Server IT Plan Technology Tips Books Turn Key Workers Upselling Application Accountants A.I. User Tip Virtual Assistant Wi-Fi Printer Server Administrator email scam Human Resources Addiction Supercomputer Multi-factor Authentication Advertising Flash Fake News Trojan Video Surveillance CIO Point of Contact Audit Saving ZTime Migration Connected Devices Windows XP Data Warehousing Worker Wireless Headphones Telephone Staffing Google Wallet Microchip Organize Displays Access Reading Samsung Digital Signature Equifax Fleet Tracking Society Emergency Hard Drive Disposal Network Management Computer Care Analytic Employer Employee Relationship Teamwork Harddrive Device security MSP Recycling Microsoft Excel G Suite Entertainment Debate Micrsooft Desktop Finance Google Drive Windows Server 2008 Licensing GPS Nanotechnology Social Network Drones Product Reviews Hacks Physical Security Spyware Mobile Payment Read Relocation Tablets Startup Asset Tracking Proxy Server Vulnerability Banking Webinar Botnet External Harddrive PDF Business Cards Service Level Agreement Managing Stress CrashOverride Regulation 3D Printing Capital Data Analysis Printers Productuvuty