Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Week’s Tech Term: Blockchain

This Week’s Tech Term: Blockchain

As one of the most important emerging technologies out there at the moment, speculation about blockchain, and its growing list of practical applications, has run rampant. Soon, someone will come out with a blockchain application that makes and delivers pizzas. In all seriousness, it really holds a lot of promise for the development of interesting applications. For this week’s tech term, we look at the blockchain.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Tech Term Business Computing Internet Computer Network Security Business Data Hosted Solutions Software Efficiency IT Services Innovation Data Backup Mobile Devices User Tips Android Smartphone Hardware Communication Google Browser Microsoft Windows 10 Business Management Small Business Workplace Tips Productivity Artificial Intelligence Ransomware Productivity Data Recovery Managed Service Provider Backup Gmail Data Management Facebook Internet of Things IT Support Smartphones Social Media Server Two-factor Authentication Microsoft Office Saving Money Collaboration App Encryption Information Applications Windows Office 365 Office Tips Upgrade Managed Service Bandwidth Cloud Computing Business Technology Cybersecurity Disaster Recovery Windows 10 Automation Miscellaneous Spam Phishing Managed IT Services communications Passwords Mobile Device Website BDR Mobile Device Management IT Support Printer Firewall Access Control Business Continuity The Internet of Things WiFi Big Data Infrastructure Social VoIP Tip of the week Paperless Office Government Scam Apps Employer-Employee Relationship Going Green Users BYOD Holiday Computing Blockchain Outsourced IT Vulnerability HIPAA Vendor Router Robot Data storage LiFi Modem End of Support Analytics Mobile Security Chrome Augmented Reality Money Quick Tips Storage Safety Sports Saving Time Mouse Bring Your Own Device Administration Apple Network Antivirus Settings Document Management Printing Content Filtering Customer Service Maintenance Hacking Cybercrime Wi-Fi Data Security Presentation Computers Cost Management Hacker Office Wireless Technology Risk Management Websites Bitcoin SSID Running Cable Virtual Desktop Unified Threat Management Tablet Google Wallet Save Money Marketing Microchip Black Friday Internet Exlporer Mobile Office Remote Monitoring Fraud Recovery VPN Hard Drives Machine Learning Windows 8 Laptop Username User Tip User Error Domains Word Drones Outlook Vendor Management Processor Cyber Monday Database IT Management Virtual Private Network IT Technicians Refrigeration Error Halloween Proxy Server Cookies Public Speaking Google Maps Network Congestion Humor Electronic Medical Records Navigation Smart Technology Tactics Lithium-ion battery Hotspot Mirgation Entrepreneur Hacks Scary Stories Monitoring Help Desk Fun Nanotechnology Budget Display Virtual Reality Deep Learning Evernote Distributed Denial of Service Addiction Network Management Language Chatbots Undo Travel Password Management Education SharePoint Screen Reader Monitors Remote Computing Healthcare Managed IT Service Service Level Agreement Computing Infrastructure Conferencing Lenovo Identity Virtualization Unified Threat Management Mobile Computing Bookmark Search Downloads Smart Tech Alerts Application Alert Best Practice Tech Break Fix Download Telephone Superfish Current Events Buisness Gadgets IT solutions Browsers Multi-Factor Security Connectivity IBM Legal Writing Server Management Licensing Business Growth Term Upload Social Network Compliance Retail Entertainment Cortana Google Calendar IoT Customer Relationship Management Managed IT Services Dark Web Cooperation Alt Codes Mobility Trends Customer Resource management Wireless Networking Regulations Competition Downtime Social Engineering Hosted Solution Data Analysis Legislation Star Wars Microsoft Excel Operating System Staff Typing Google Play Gamification Telephone System Social Networking Identity Theft YouTube Fileless Malware Knowledge Comparison Data loss User Google Drive Patch Management Wearable Technology Tech Support Cryptocurrency Security Cameras Content Health IT 5G Techology Motherboard Information Technology Dark Data Google Docs How To Unified Communications Directions Experience Specifications Assessment IP Address Permissions Avoiding Downtime

Sign Up For Our Newsletter!