Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Prefer Your Reality Augmented, or Virtual?

Do You Prefer Your Reality Augmented, or Virtual?

At the International Consumer Electronics Show (CES), new products (and the technologies that fuel those products) are put on display to give industry professionals a look to see what companies are working on. At CES 2018, held in Las Vegas, Band and Olufsen introduced their speakers-as-art-concept, Samsung unveiled a 146” television that is designed to take up a wall, and many companies, including Aura, introduced new smart home security products that are sure to get an intruder’s attention (over Wi-Fi).

Continue reading
0 Comments

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Tech Term Business Computing Internet Computer Network Security Business Data Hosted Solutions Efficiency Innovation IT Services Software Android Mobile Devices Data Backup User Tips Smartphone Hardware Communication Browser Google Microsoft Windows 10 Business Management Small Business Workplace Tips Productivity Productivity Data Recovery Artificial Intelligence Ransomware Managed Service Provider IT Support Backup Gmail Data Management Facebook Smartphones Internet of Things Social Media Saving Money Two-factor Authentication Collaboration App Encryption Server Microsoft Office communications Upgrade Windows Office 365 Managed IT Services Office Tips Mobile Device Miscellaneous Bandwidth Spam Disaster Recovery Phishing Cloud Computing Information Business Technology Cybersecurity Applications Windows 10 Passwords Managed Service Automation Paperless Office Computing Government Scam Mobile Device Management BYOD Firewall Holiday The Internet of Things WiFi Outsourced IT IT Support Big Data Social Business Continuity BDR Apps Employer-Employee Relationship Users Blockchain Printer VoIP Access Control Going Green Infrastructure Website Tip of the week Cybercrime Wi-Fi Risk Management Saving Time Antivirus Document Management Maintenance Data storage LiFi Data Security Safety Analytics Chrome Augmented Reality Money Vulnerability Robot Storage End of Support Sports Mouse Cost Management Bring Your Own Device Apple Administration Quick Tips Customer Service Hacking HIPAA Presentation Computers Vendor Hacker Office Network Wireless Technology Mobile Security Settings Printing Content Filtering Recovery Superfish Navigation Marketing Tactics Typing Hotspot Mobile Office Mirgation YouTube Hard Drives Multi-Factor Security Monitoring Writing Help Desk Google Drive Nanotechnology Knowledge Domains Word Server Management Evernote Addiction Cryptocurrency Language Chatbots 5G Refrigeration Google Calendar Managed IT Services Management Information Technology Retail Google Docs Screen Reader Unified Communications Experience Public Speaking Networking Healthcare Service Level Agreement Bitcoin Computing Infrastructure Running Cable Lithium-ion battery Identity Virtual Desktop Legislation Entrepreneur Conferencing Google Wallet Social Engineering Bookmark Smart Tech Tech Identity Theft Download Windows 8 Alerts Laptop Undo Comparison Data loss Telephone Drones Browsers Outlook Tech Support Connectivity Patch Management Techology Term Upload Dark Data Licensing Halloween Compliance Virtualization Specifications Social Network How To Entertainment Humor Websites IoT Dark Web Application Unified Threat Management Mobility Tablet Trends Hacks Cooperation Scary Stories Regulations Fun Black Friday Remote Monitoring Customer Resource management Budget Save Money VPN Data Analysis Gadgets Machine Learning Star Wars Deep Learning Microsoft Excel IBM User Error Google Play Gamification Password Staff Vendor Management Social Networking Education Cyber Monday IT Management Telephone System Virtual Private Network Fileless Malware Error Customer Relationship Management Security Cameras Google Maps Content Mobile Computing Network Congestion Wearable Technology Electronic Medical Records Motherboard Search Competition Smart Technology Health IT Directions Assessment Best Practice Permissions Buisness Current Events Display Legal Virtual Reality Router IT solutions Distributed Denial of Service Network Management User Microchip Travel Internet Exlporer Business Growth Fraud SharePoint Username Monitors Remote Computing Modem Cortana Managed IT Service User Tip Avoiding Downtime Lenovo Processor Unified Threat Management Database Alt Codes IP Address Downtime Wireless Downloads IT Technicians Proxy Server Operating System Alert Cookies Hosted Solution Break Fix

Sign Up For Our Newsletter!