Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Android Data Recovery Disaster Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Automation Artificial Intelligence Information Cloud Computing Covid-19 Training Gadgets Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Two-factor Authentication Apps Mobile Office Data Security Vendor Gmail BYOD WiFi Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Voice over Internet Protocol Networking Apple App Mobile Device Management Computing Information Technology Access Control Conferencing Office 365 Hacker Avoiding Downtime How To Marketing BDR HIPAA Applications Operating System Risk Management Help Desk Virtual Private Network Big Data Health Analytics Office Tips Augmented Reality Retail Computers Storage Password Bring Your Own Device Managed IT Services Healthcare Website 2FA Router Vendor Management Microsoft 365 Cybercrime Physical Security Solutions The Internet of Things Monitoring Display Printer Paperless Office Social Infrastructure Telephone Document Management Customer Service Cooperation Scam Remote Workers Data loss Windows 11 Free Resource Patch Management Going Green Excel Project Management Save Money Windows 7 Firewall Remote Monitoring End of Support Vulnerability Mobile Security Multi-Factor Authentication Processor Content Filtering Mobility IT Management Meetings YouTube Safety VPN Cryptocurrency Smart Technology Employees Computer Repair Integration Virtual Desktop Saving Time Data Privacy Data storage LiFi Managed IT Service Outlook Holidays Customer Relationship Management Downloads Machine Learning Money Data Storage Licensing Humor Video Conferencing Managed Services Provider Entertainment Hacking Presentation Maintenance Virtual Machines Professional Services Sports Antivirus Mouse Wireless Technology Telephone System Administration Cost Management iPhone Word Supply Chain Vulnerabilities Robot Images 101 Settings User Tip Wireless Modem Printing Unified Threat Management Entrepreneur Paperless Organization Hosted Solution Database IT Technicians Co-managed IT Digital Security Cameras Typing Smart Devices Remote Working Memory Network Congestion Proxy Server Cookies Technology Care Cyber Monday User Error Hotspot Business Communications Google Drive Data Breach Knowledge Google Play Undo Tactics Mirgation Scams Videos Electronic Health Records Point of Sale Wasting Time 5G Nanotechnology Hybrid Work Language Human Resources Google Docs Unified Communications Trend Micro Experience Security Cameras Addiction Running Cable Management Chatbots Cables Network Management Bitcoin Software as a Service Tech Support Google Wallet Managing Costs Monitors Application Screen Reader Distributed Denial of Service Computing Infrastructure Google Apps eCommerce SSID Service Level Agreement Laptop Virtual Assistant IBM Identity IT Maintenance Windows 8 Surveillance Websites Drones Virtual Machine Bookmark Smart Tech Business Intelligence Download SharePoint Alerts Shortcuts Reviews Electronic Medical Records Medical IT Halloween Transportation Ransmoware Development Break Fix Hypervisor Writing Browsers Connectivity Vendors Lenovo Competition Upload Be Proactive Shopping Optimization Virtual Reality PowerPoint Scary Stories Employer/Employee Relationships Social Network Workforce Server Management Multi-Factor Security Hacks Private Cloud Dark Web PCI DSS Identity Theft Fun Navigation IoT Threats Superfish Trends Workplace Strategies Gig Economy Deep Learning Twitter Teamwork Customer Resource management User Regulations Meta Google Calendar Internet Service Provider Error Microsoft Excel Regulations Compliance Education Social Engineering Data Analysis Evernote Star Wars Amazon Gamification Staff Memes Remote Computing SQL Server IP Address Social Networking Outsource IT Legislation Mobile Computing Net Neutrality Media Financial Data Tablet History Fileless Malware Search Environment Content Wearable Technology Smartwatch Best Practice IT Alert File Sharing Buisness Azure Dark Data Health IT Recovery Motherboard Small Businesses Managed IT Comparison Procurement Permissions Legal Telework IT solutions Cyber security How To Directions Tech Hard Drives Assessment Displays Domains CES Business Growth Communitications Notifications Supply Chain Management Travel Outsourcing Specifications Techology Fraud FinTech Google Maps Microchip Cortana Term Refrigeration Internet Exlporer Public Speaking Username Workplace Alt Codes IT Assessment Flexibility Unified Threat Management Downtime Value Lithium-ion battery Hiring/Firing Black Friday

Blog Archive