Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Android Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Cloud Computing Gadgets Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Bandwidth Virtualization Business Technology Blockchain Wi-Fi Windows 10 Data Security Apps Vendor Mobile Office Two-factor Authentication Budget WiFi BYOD Apple Employer-Employee Relationship App Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Networking Gmail Chrome BDR Conferencing Access Control Hacker Computing Avoiding Downtime HIPAA Information Technology Marketing Applications Office 365 How To Storage Password Big Data Bring Your Own Device Virtual Private Network Health Computers Operating System 2FA Risk Management Website Router Retail Healthcare Office Tips Analytics Managed IT Services Augmented Reality Help Desk Free Resource Project Management Patch Management The Internet of Things Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Social Vendor Management Telephone Solutions Physical Security Display Cooperation Going Green Printer Paperless Office Customer Service Infrastructure Cybercrime Windows 11 Document Management Excel Remote Workers Scam Data loss Firewall Monitoring Safety Saving Time Images 101 Robot Data Privacy Sports Multi-Factor Authentication Mouse Mobility Managed IT Service Downloads Administration IT Management VPN Meetings Licensing Employees Entertainment Customer Relationship Management Integration Computer Repair Settings Hacking Printing Wireless Content Filtering Telephone System Presentation Holidays Cost Management YouTube Data Storage Machine Learning Wireless Technology Cryptocurrency Video Conferencing Managed Services Provider Supply Chain Virtual Machines Professional Services Virtual Desktop Maintenance Antivirus User Tip Modem Word Data storage LiFi Processor Mobile Security Outlook iPhone Money Humor Smart Technology Vulnerabilities Hacks Human Resources Scary Stories Addiction How To Supply Chain Management Language Notifications FinTech Undo Chatbots Cables Term Fun Management Travel Screen Reader IT Assessment Distributed Denial of Service Deep Learning Value Google Apps Techology Google Maps Service Level Agreement Flexibility Computing Infrastructure Organization Identity IT Maintenance Education Bookmark Unified Threat Management Digital Security Cameras Smart Tech Smart Devices Business Intelligence Alerts Memory Mobile Computing Shortcuts Unified Threat Management Download Remote Working Application Data Breach Ransmoware Google Play Search Best Practice Browsers Videos IBM Connectivity Network Congestion Electronic Health Records Break Fix Vendors Wasting Time Be Proactive User Error Buisness Upload Social Network Trend Micro Legal Multi-Factor Security Workforce Security Cameras IT solutions Business Growth Point of Sale IoT Software as a Service Dark Web Threats Managing Costs Workplace Strategies Trends Cortana Customer Resource management Tech Support Competition Regulations eCommerce Google Calendar Meta SSID Network Management Alt Codes Data Analysis Star Wars Monitors Surveillance Microsoft Excel Amazon Virtual Assistant Staff Virtual Machine Downtime Gamification Websites Reviews Social Networking Legislation Outsource IT Medical IT Hosted Solution Typing Media Fileless Malware Development User Environment Transportation Wearable Technology Hypervisor SharePoint Content Electronic Medical Records Knowledge Health IT Shopping Motherboard Optimization Google Drive Comparison Small Businesses PowerPoint Lenovo Directions IP Address Assessment Writing Permissions Displays Employer/Employee Relationships PCI DSS Navigation 5G Virtual Reality Server Management Experience Private Cloud Gig Economy Google Docs Specifications Outsourcing Unified Communications Teamwork Bitcoin Superfish Running Cable Microchip Identity Theft Internet Exlporer Internet Service Provider Recovery Fraud Twitter Regulations Compliance Hard Drives Google Wallet Workplace Evernote Username Error Domains Memes Black Friday Hiring/Firing SQL Server Windows 8 Paperless Laptop Database Social Engineering Net Neutrality Remote Computing Financial Data Refrigeration IT Technicians History Drones Co-managed IT Proxy Server Smartwatch Public Speaking Cookies IT Cyber Monday Technology Care Azure Business Communications Halloween Tablet Lithium-ion battery Tactics Procurement Hotspot Alert Telework Mirgation Cyber security Entrepreneur Scams Tech Managed IT File Sharing CES Nanotechnology Dark Data Communitications Hybrid Work

Blog Archive