Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Star Wars Has Shaped Our Technology More Than You Know

b2ap3_thumbnail_rd_d2_droid_400.jpgIt’s been a full 38 years since we were introduced to the Skywalker family in the first Star Wars film, “A New Hope.” The science fiction franchise has become such a cultural phenomenon that it even has its own holiday, celebrated galaxy-wide every May 4th (May the 4th be with you).

As an IT company, we’ve always been fascinated with the futuristic technology seen in Star Wars. After watching any one of the six Star Wars movies, viewers can’t help but walk away from the experience with questions like, “How long until we get cool starships and laser blasters?”

Even though we’re still a long ways away from having pod racing replace Formula One, our society has made some great strides over the past four decades to look more and more like Star Wars. In fact, you might remember that, at the height of the Cold War, the United States went so far as to consider using Star Wars-like space lasers.

reagan star wars

The influence of Star Wars can most dramatically be seen in the technology we use every day. Take computers, for example. Every year they become more capable of doing more tasks, especially mobile devices. In fact , if you tried explaining today’s smartphone to someone from 1977, they would probably think it to be straight out of science fiction.

It may be for this very reason why Android nicknamed their product “droid.” In Star Wars, droids act as the ultimate personal device, capable of doing virtually any and all tasks asked of them by their humanoid counterparts. Modern smartphone manufacturers pride themselves with just how many different tasks users can accomplish with their mobile devices, but how close are we to actually having our “droids” be as helpful as the droids from Star Wars?

To get to the bottom of this, let’s take an in-depth look at everyone’s favorite Star Wars droid, R2-D2 (sorry C3PO).

Your-Own-R2-D2

Over the span of six movies, R2-D2 has shown much versatility, surprising fans of the franchise with new tricks in each episode (think how much of a game-changer it would have been if R2-D2 could have used his thrusters in the original trilogy). To get an accurate understanding of what all R2 can do, we turn to the Internet’s authority on all things Star Wars, Wookieepedia:

R2-D2 was a diminutive droid, standing 0.96 meters tall. He rolled on three legs, one of which could retract into his body, and had a silver and blue domed head. His white, blue, and silver body housed many arms, sensors, and other apparatuses, many of which were not readily seen by the typical humanoid eye. This often made the droid seem like a box of tricks, unexpectedly pulling out some previously unseen but very much needed device at a critical moment.

Features of the R2-series astromech droid include (bolded are the tasks that we can do on our modern “droid” devices):

  • Rocket booster
  • Cable gun
  • Oil injector
  • Claw arm
  • Fusion cutter
  • Holoprojector / Recorder
  • Internal comlink
  • Periscope
  • Electric pike
  • Propeller
  • Hidden lightsaber compartment with ejector
  • Fire extinguisher / Smoke Screen
  • Small Saw
  • Air Cannon
  • Crashmat
  • Lariat
  • Submarine Mode
  • Collapsible Umbrella
  • Flea Remover
  • Distracter
  • Headdress Detangler
  • Droid Deactivator
  • Computer Interface Arm
  • Charge Arm (electric shock)
  • Life-form Scanner
  • Breakdance Mode
  • Polarity sink
  • Water pump/hose
  • Inflatable mattress
  • Media copy / storage disc drive
  • Jukebox
  • Small red "tongue" ribbon
  • "Confetti-creation device"
  • Lubricant Application Arm
  • Motorized, all-terrain treads
  • Power recharge coupler

r2_d2_schematics.jpg

As great as the 'droids are that we carry in our pockets, we’ve still got a long, long way to go before we have personal devices that can do everything that this “extremely well put-together little droid” can do. However, despite this technological shortcoming, it’s still amazing that we’ve come as far as we have over the past 38 years. Who knows, maybe within the next 40 years we’ll finally have lightsabers.

We can’t know for sure what the future of personal technology will look like, but one we do know, if everybody gets their own R2-D2 unit, Total Tech Care will be available to provide technical support. May the 4th be with you!

Images courtesy of the Walt Disney corporation.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Managed IT Services Upgrade Windows Ransomware Data Backup Outsourced IT Windows 10 Save Money Cloud Computing Office Data Recovery Server Passwords Windows 10 Chrome Tech Term Gadgets Virtualization Social Media Saving Money Holiday Managed Service Microsoft Office Managed IT Services Automation Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking IT Support Managed Service Provider Covid-19 Spam Information Office 365 Telephone Systems Alert Information Technology Remote Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Bandwidth Big Data Remote Monitoring Law Enforcement App History Mobile Computing Password Data Breach Money Application Human Resources Encryption Applications How To Mobile Office Government Private Cloud Data Storage Patch Management Office Tips Training Managed IT VPN Apps Remote Computing Blockchain Paperless Office HaaS Avoiding Downtime Infrastructure Voice over Internet Protocol Flexibility Vulnerability Marketing Wireless WiFi Windows 7 Word IT solutions Bring Your Own Device Entertainment Data Management Gmail Work/Life Balance Website Budget Servers Settings Two-factor Authentication Data Security Google Drive Mouse Machine Learning Keyboard User Error Remote Work Connectivity Meetings Employee/Employer Relationship RMM Risk Management Hacker Conferencing Save Time Scam The Internet of Things Lithium-ion battery Data Protection Cleaning USB Vendor Management Firewall End of Support Education Physical Security Virtual Reality Safety Vendor Apple Sports HIPAA Managed Services Social Telephone System Staff Redundancy Display Software as a Service Processor Value Proactive IT Update Electronic Medical Records Best Practice Spam Blocking Hard Drive YouTube Black Market Google Docs Wearable Technology Hiring/Firing Identity Theft Retail Hard Drives Virus Instant Messaging Robot Excel Computing Document Management Unified Threat Management Biometrics Solid State Drive Computer Accessories Wireless Technology Virtual Desktop Augmented Reality How to Downtime Fraud Business Intelligence DDoS Remote Worker Data storage Digital Signage Worker Automobile Audit IT Management Cryptocurrency Printer SharePoint Bluetooth Computing Infrastructure Botnet IT Plan Procurement Going Green Customer Service Workplace Strategy Net Neutrality Comparison Environment Unsupported Software CES Help Desk IT Consultant Fax Server Battery Printing Charger Shadow IT Business Technology Legal Content Management SaaS Humor Access Control Compliance Managed Services Provider Computer Care Internet Exlporer OneNote Virtual Assistant Current Events Telephony Authentication Database PDF Samsung Network Congestion Remote Workers eWaste Telecommuting Email Best Practices Skype Project Management Tablets IT Assessment Nanotechnology Relocation Manufacturing Data loss Cortana Best Available Entrepreneur WIndows 7 Computer Tips Outlook Video Games Managed IT Service Leadership Digital Signature Security Cameras Troubleshooting Shortcut Virtual CIO Start Menu Warranty Worker Commute OneDrive Biometric Security Screen Mirroring HVAC Loyalty Google Apps Experience Cost Management Peripheral Social Networking Digital Security Cameras Frequently Asked Questions Scalability Using Data Analysis Books Mobile Administrator Business Owner Copiers Windows 10s Devices 5G Quick Tip Cast Enterprise Content Management NarrowBand Running Cable User Ergonomics Tip of the week MSP Search PowerPoint webinar Accountants Windows Media Player Smartwatch Emergency OLED Employer Employee Relationship Credit Cards Professional Services Microchip Memory Development Public Cloud Thought Leadership iPhone PCI DSS Password Management Virtual Machine Assessment Password Manager Managing Stress 2FA Windows Server 2008 Fiber Optics Employee Multi-Factor Security Cabling Tools Search Engine Messaging Twitter Files Policy NIST Cameras Hypervisor Television Business Mangement Chromecast Dark mode Science Trend Micro Smart Tech Trending Default App Amazon Uninterrupted Power Supply SMS Addiction Colocation Procedure Saving Time Public Computer Recycling Distributed Denial of Service Customer Relationship Management dark theme Regulations Wiring Shopping Practices Monitor Google Search Transportation IT Infrastructure Rootkit Amazon Web Services Analyitcs AI Computer Fan Cache Programming FinTech Safe Mode Printer Server Criminal Bing Streaming Media GDPR Social Network Workers Hosted Computing Reputation Benefits Investment Online Shopping Tech Support Content FENG Wireless Internet Employees File Sharing Techology Employee/Employer Relationships IBM Laptop Antivirus Windows 365 Flash Camera Windows 8 Inventory Customers ISP Smart Technology Specifications ROI Evernote IT service Audiobook Video Conferencing Wire Sales Software Tips Bitcoin Supercomputer Touchpad Shortcuts Travel Point of Sale Sync Printers Tablet Personal Emails Cryptomining Millennials Advertising Wireless Charging Domains Politics Supply Chain Management Smart Office Monitoring Batteries Notifications IaaS Maintenance Windows 8.1 Virtual Private Network Digitize Netflix Two Factor Authentication Workforce Root Cause Analysis Windows Server 2008 R2 Cables Consultant Bloatware Customer relationships HBO Analytics Knowledge Music

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code