Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Data Backup Microsoft Small Business Communication Mobile Device Smartphones communications Android Workplace Strategy Business Management Mobile Devices Smartphone VoIP Saving Money Managed IT Services Microsoft Office Managed Service Data Recovery Browser Social Media Passwords Upgrade Backup Disaster Recovery Network Internet of Things Tech Term Automation Covid-19 Remote Cloud Computing Server Managed Service Provider Artificial Intelligence Remote Work Facebook Miscellaneous Windows Gadgets Encryption Spam Windows 10 Information Outsourced IT Employee/Employer Relationship Holiday Data Management Business Continuity Government Blockchain Productivity Wi-Fi Business Technology Windows 10 Two-factor Authentication Bandwidth Data Security Virtualization Current Events Compliance Apps Managed Services Voice over Internet Protocol Office Vendor Mobile Device Management Chrome Networking Gmail Budget Apple App Employer-Employee Relationship Access Control Computing Hacker Information Technology Avoiding Downtime Applications Mobile Office Office 365 How To BDR Conferencing Operating System Health Computers Risk Management Router Website Marketing Retail Analytics Office Tips Augmented Reality Help Desk Managed IT Services Storage Password Bring Your Own Device WiFi Big Data BYOD Virtual Private Network Training Paperless Office Customer Service Cybercrime Infrastructure Remote Workers HIPAA Tip of the week Healthcare Document Management Free Resource Project Management Scam Windows 7 Data loss IT Support Monitoring Firewall Microsoft 365 AI Solutions Windows 11 The Internet of Things Patch Management Save Money Remote Monitoring Telephone End of Support Vulnerability Social Vendor Management Excel Going Green Cooperation Display Printer Professional Services Telephone System Virtual Machines Content Filtering Hacking Cost Management Presentation YouTube Data Privacy Cryptocurrency Machine Learning Wireless Technology iPhone Virtual Desktop Vulnerabilities User Tip Data storage Modem LiFi Mobile Security Maintenance Processor Word Antivirus Outlook Images 101 Money Multi-Factor Authentication Mobility Humor Smart Technology Saving Time Safety Sports Mouse Robot Employees Managed IT Service Integration 2FA Supply Chain Administration Downloads Licensing IT Management Meetings Holidays VPN Entertainment Data Storage Customer Relationship Management Video Conferencing Settings Computer Repair Printing Managed Services Provider Wireless Scams Monitors Gig Economy Social Networking Hosted Solution Legislation Internet Service Provider Teamwork Fileless Malware Hybrid Work Typing Content Human Resources Regulations Compliance Wearable Technology Evernote Websites Health IT Google Drive Cables Motherboard User Memes Comparison Knowledge Net Neutrality Permissions SharePoint SQL Server Directions Electronic Medical Records Assessment Google Apps Financial Data History 5G Lenovo Google Docs IT Maintenance Writing IP Address Smartwatch Unified Communications IT Specifications Experience Procurement Fraud Running Cable Azure Microchip Business Intelligence Virtual Reality Internet Exlporer Bitcoin Private Cloud Username Google Wallet Shortcuts Telework Cyber security Server Management Tech Superfish Identity Theft Ransmoware CES Recovery Communitications Black Friday Hard Drives Supply Chain Management Laptop Vendors Twitter Database Windows 8 Error Drones Be Proactive Domains FinTech IT Technicians Term Proxy Server Workforce Social Engineering Cookies IT Assessment Cyber Monday Refrigeration Flexibility Hotspot Halloween Value Threats Remote Computing Tactics Workplace Strategies Public Speaking Organization Mirgation Tablet Meta Lithium-ion battery Digital Security Cameras Nanotechnology Smart Devices Remote Working Language Scary Stories Entrepreneur Memory Amazon Alert Addiction Hacks File Sharing Management Dark Data Chatbots Data Breach Fun Managed IT Google Play Outsource IT How To Videos Screen Reader Deep Learning Electronic Health Records Distributed Denial of Service Service Level Agreement Media Undo Computing Infrastructure Wasting Time Environment Notifications Travel Identity Education Trend Micro Security Cameras Techology Google Maps Bookmark Small Businesses Smart Tech Software as a Service Download Mobile Computing Alerts Managing Costs Displays Unified Threat Management eCommerce Search SSID Surveillance Break Fix Unified Threat Management Virtual Assistant Browsers Outsourcing Connectivity Best Practice Application Upload Buisness Virtual Machine Medical IT Social Network Legal Workplace Network Congestion IBM Reviews IT solutions Multi-Factor Security Development Dark Web User Error Transportation Hiring/Firing Physical Security IoT Business Growth Trends Paperless Hypervisor PowerPoint Point of Sale Customer Resource management Co-managed IT Shopping Regulations Optimization Google Calendar Cortana Microsoft Excel Employer/Employee Relationships Data Analysis Technology Care Star Wars Alt Codes Gamification Business Communications Competition PCI DSS Staff Downtime Network Management Navigation Tech Support

Blog Archive