Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Android Disaster Recovery Data Recovery AI Upgrade Business Management Smartphones VoIP Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Artificial Intelligence Information Holiday Facebook Automation Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Apps Data Security Mobile Office Vendor Two-factor Authentication Tip of the week Chrome Budget Managed Services Employer-Employee Relationship Voice over Internet Protocol Apple Networking App BYOD Mobile Device Management Gmail WiFi Conferencing How To Hacker BDR Avoiding Downtime Marketing Computing HIPAA Information Technology Applications Access Control Office 365 Office Tips 2FA Analytics Help Desk Big Data Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Computers Website Operating System Router Virtual Private Network Risk Management Health Monitoring Social Document Management Excel Remote Workers Scam Telephone Data loss Customer Service Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Vendor Management Cybercrime Solutions Physical Security Firewall Display Printer Paperless Office Infrastructure The Internet of Things Windows 11 Outlook Data Storage Machine Learning Smart Technology Supply Chain Money Video Conferencing Managed Services Provider Humor Saving Time Virtual Machines Professional Services Maintenance Antivirus Sports Customer Relationship Management Managed IT Service Mouse Downloads iPhone Licensing Hacking Administration Presentation Entertainment Vulnerabilities Data Privacy Wireless Technology Images 101 Robot Telephone System Settings Multi-Factor Authentication Mobility Printing Cost Management Wireless Content Filtering IT Management Word VPN YouTube Meetings Cryptocurrency Employees Integration Computer Repair User Tip Modem Processor Virtual Desktop Safety Mobile Security Data storage LiFi Holidays Electronic Medical Records Mirgation Hypervisor Displays SharePoint Shopping Halloween Nanotechnology Optimization PowerPoint Application Lenovo Addiction Writing Language Employer/Employee Relationships Outsourcing Management PCI DSS Virtual Reality Chatbots Navigation Hacks Server Management Gig Economy Scary Stories Private Cloud Screen Reader IBM Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Superfish Identity Theft Service Level Agreement Internet Service Provider Fun Regulations Compliance Twitter Identity Evernote Paperless Deep Learning Bookmark Error Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Education Download Net Neutrality Social Engineering Financial Data Remote Computing History Competition Business Communications Mobile Computing Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Tablet Upload Procurement Search Social Network Telework Alert Cyber security Multi-Factor Security Tech Human Resources Best Practice User Managed IT CES Buisness File Sharing IoT Communitications Dark Data Dark Web Cables Legal IT solutions Trends Supply Chain Management How To Customer Resource management FinTech Notifications Regulations Google Calendar Term Google Apps Business Growth Data Analysis Travel Star Wars IT Assessment IP Address Microsoft Excel IT Maintenance Staff Value Business Intelligence Techology Google Maps Gamification Flexibility Cortana Alt Codes Organization Social Networking Legislation Shortcuts Recovery Fileless Malware Digital Security Cameras Downtime Unified Threat Management Smart Devices Ransmoware Wearable Technology Memory Vendors Hard Drives Unified Threat Management Hosted Solution Content Remote Working Typing Health IT Motherboard Data Breach Domains Comparison Google Play Be Proactive Directions Videos Assessment Electronic Health Records Network Congestion Permissions Workforce Knowledge Wasting Time Threats Refrigeration Google Drive User Error Trend Micro Public Speaking Specifications Security Cameras Workplace Strategies Microchip Point of Sale Internet Exlporer Software as a Service 5G Lithium-ion battery Fraud Meta Experience Managing Costs Amazon Google Docs Entrepreneur Unified Communications Username Bitcoin Network Management Running Cable Tech Support eCommerce Black Friday SSID Google Wallet Database Surveillance Monitors Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Undo Media Windows 8 Proxy Server Reviews Laptop Websites Cookies Cyber Monday Medical IT Drones Tactics Development Hotspot Transportation Small Businesses

Blog Archive