Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Find Your Downloaded Files in Android

Tip of the Week: How to Find Your Downloaded Files in Android

Smartphones have become an important part of our lives, whether it’s for personal or professional purposes. Downloading media to devices rather than computers was practically unheard of, but nowadays it’s commonplace. Now that we mention it… where exactly do those files wind up going on an Android device? This week’s tip is all about how to find your downloads on an Android device.

Continue reading
0 Comments

Tip of the Week: Leveraging Gmail’s Smart Compose Feature on Android

Tip of the Week: Leveraging Gmail’s Smart Compose Feature on Android

With technologies like machine learning and artificial intelligence entering further into our daily lives, what was once science fiction is becoming fact - assisting our lives (which most would agree is better than threatening our lives). For this week’s tip, we’ll show you how to leverage machine learning in a very basic way: in the Android version of Gmail’s Smart Compose feature.

Continue reading
0 Comments

Tip of the Week: How to Get Production Out of Your Smartphone

Tip of the Week: How to Get Production Out of Your Smartphone

With the holiday season winding down, business needs to get done, which means that organizations will be expecting their employees to get back to work and make things happen as quickly as possible. Mobile devices make this prospect much easier, as work can be done on-the-go in a flexible manner. Here are some tips to get the most out of your mobile devices post-holiday season.

Continue reading
0 Comments

5 Good Mobile Browsers for Android Devices

5 Good Mobile Browsers for Android Devices

Using a mobile device to browse the Internet has its perks, but one of the biggest ones is that you have so many options for browsers. If you’re having trouble selecting one for your needs, it’s generally best to stick with ones that you’ve used in the past. Here are a couple of options you have for mobile browsing.

Continue reading
0 Comments

Tip of the Week: Using Less Data on Android

Tip of the Week: Using Less Data on Android

Mobile data is extremely important to the productivity and efficiency of modern businesses--especially when employees and administrators are out of the office. The major drawback of this is that it can be an expensive setup, as mobile data transfer can be pricey. We can help you get around this issue by minimizing the amount of data your Android device uses.

Continue reading
0 Comments

Tip of the Week: Putting Your Old Android Device to Good Use

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

Continue reading
0 Comments

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Downloading an application on an Android device is fairly simple: access the Google Play store, find the app you want to download, and press the button that says install. However, it is also too easy to simply hit ‘Allow’ once the app starts asking for ambiguously-worded permissions. Today, we’ll examine what these permissions actually mean.

Continue reading
0 Comments

Secure Your Android During the Holiday Season

Secure Your Android During the Holiday Season

Android is a very common operating system on mobile devices around the world, and because of this, you won’t be surprised to hear that hackers are always trying to one-up security developers. If your business takes advantage of Android devices like smartphones or tablets, you’ll want to consider these 11 security tips that will help keep your organization safe.

Continue reading
0 Comments

Have You Tried Google’s Cloud Printing?

Have You Tried Google’s Cloud Printing?

Most people don’t think to try and print something out from their smartphone--particularly because it’s such a new concept. With smartphones quickly becoming just as fast as desktops from just ten years ago, it shouldn’t be such a stretch to suggest printing from them. Thanks to the cloud, you can use your Android smartphone to print something directly from the device.

Continue reading
0 Comments

Tip of the Week: The Only Feature Android Oreo Is Missing Is the Cream Filling

Tip of the Week: The Only Feature Android Oreo Is Missing Is the Cream Filling

The latest version of Android, Oreo (version 8.0), was released earlier this year. Has your phone received the update to it yet? Either way, you’ll want to know what features it has, including how it can help you get more done. Here are five of the many new additions offered by this update to Android Oreo operating system.

Continue reading
0 Comments

Tip of the Week: Android Makes it Easy to Block Telemarketers

b2ap3_thumbnail_block_calls_400.jpgEveryone gets unwanted calls from unsolicited numbers on their smartphone. It’s a part of life. What matters, though, is how you deal with these callers. While a pretty comprehensive solution to this problem can be contacting your provider, some more recent models of Android smartphones have the ability to blacklist phone numbers built right into the device.

Continue reading
0 Comments

Warning: Malicious Adware Finds New Way to Spread on Android Devices

b2ap3_thumbnail_security_for_your_it_400.jpgWith many organizations heavily relying on mobile computing, malicious operators have begun targeting the “low-lying fruit” of a business’ IT infrastructure, which is often a company’s mobile devices. Kemoge, a malicious adware strain designed to corrupt Android mobile operating systems, is the latest mobile threat that your business needs to protect itself against.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Hackers Business Computing Email Cloud Privacy Computer Malware Internet Hosted Solutions Innovation Tech Term User Tips Data Network Security Efficiency Productivity Software Business Hardware Mobile Devices Android Business Management IT Services Microsoft Communication Data Backup Social Media Smartphone Google Small Business Smartphones IT Support Data Recovery Browser Productivity communications Server Artificial Intelligence Backup Windows 10 Facebook Collaboration Workplace Tips Microsoft Office Managed Service Provider Upgrade Ransomware Data Management Internet of Things Cybersecurity Phishing Two-factor Authentication Gmail VoIP Automation App Cloud Computing Windows 10 Spam Government Office 365 Mobile Device Information Saving Money Encryption Business Technology Network Apps Employer-Employee Relationship Users Managed IT Services Passwords Windows Office Tips Outsourced IT Bandwidth Applications Disaster Recovery Managed Service Miscellaneous Infrastructure Tip of the week Computing Customer Service Paperless Office Computers BYOD Scam Cooperation Holiday Website Analytics IT Support Blockchain Mobile Device Management Augmented Reality Firewall Vulnerability Business Continuity BDR The Internet of Things Apple WiFi Printer Quick Tips Big Data Social Access Control Going Green Settings Saving Time Printing Healthcare Content Filtering Retail Cybercrime Downloads Wi-Fi Hacking Presentation Hacker Risk Management Office Wireless Technology Managed IT Services Antivirus Avoiding Downtime Networking Data storage Document Management LiFi Maintenance Mobile Office Data Security Robot Cost Management Money Chrome End of Support HIPAA Vendor Router Storage Sports Mouse Safety Modem Bring Your Own Device IT Management Mobile Security Administration Management Teamwork Chatbots Travel Cortana Writing SharePoint Screen Reader Alt Codes Computing Infrastructure Alert Customer Relationship Management Downtime Wireless Service Level Agreement Voice over Internet Protocol Conferencing SQL Server Lenovo Identity Operating System Unified Threat Management Hosted Solution Competition Bookmark Smart Tech Managed IT Service Typing Alerts YouTube Tech Download iPhone Telephone Azure Superfish Google Drive Knowledge Cryptocurrency Social Engineering Browsers Multi-Factor Security Connectivity Break Fix Server Management Licensing Information Technology Term User 5G Upload Vulnerabilities Experience Social Network Compliance Google Docs Unified Communications Bitcoin Running Cable Entertainment Google Calendar IoT Dark Web Google Wallet IP Address Virtual Desktop Mobility Trends Windows 7 Customer Resource management Regulations Dark Data Windows 8 How To Laptop Data Analysis Legislation Star Wars Microsoft Excel Marketing Staff Drones Tech Support Google Play Recovery Gamification Microsoft 365 Hard Drives Telephone System Social Networking Outlook Identity Theft Save Money Domains Halloween Fileless Malware Word Comparison Data loss Solutions Patch Management Wearable Technology Websites Security Cameras Content Refrigeration Health IT Techology Motherboard Humor Hacks Vendor Management Public Speaking Scary Stories Directions Specifications Assessment Permissions Integration Budget Machine Learning Lithium-ion battery SSID Fun Entrepreneur Unified Threat Management Tablet Deep Learning Network Congestion Fraud Password Electronic Medical Records Microchip Black Friday Internet Exlporer Remote Monitoring Username Virtual Assistant VPN Private Cloud Education Medical IT Undo User Tip User Error Display Mobile Computing Virtual Reality Processor Cyber Monday Database Transportation Virtual Private Network IT Technicians Error Search Monitors Virtualization Proxy Server Cookies Google Maps Best Practice Hotspot Current Events Twitter Buisness Navigation Smart Technology Tactics PowerPoint Monitoring Employer/Employee Relationships Mirgation Legal IT solutions Application Help Desk Nanotechnology Business Growth Network Management Language Remote Computing IBM Evernote Distributed Denial of Service Addiction Professional Services Gadgets

Sign Up For Our Newsletter!