Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Hosted Solutions Collaboration Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone Data Recovery AI Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Training Gadgets Cloud Computing Covid-19 Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Blockchain Bandwidth Two-factor Authentication Apps Vendor Data Security Mobile Office Gmail WiFi Tip of the week Chrome Managed Services Voice over Internet Protocol Employer-Employee Relationship Budget Networking Apple App BYOD Mobile Device Management Computing Information Technology Access Control Office 365 HIPAA Applications How To Hacker BDR Avoiding Downtime Marketing Conferencing 2FA Virtual Private Network Risk Management Health Big Data Analytics Office Tips Augmented Reality Retail Healthcare Storage Router Password Bring Your Own Device Managed IT Services Computers Help Desk Website Operating System Firewall Telephone Display Printer Excel Paperless Office Infrastructure The Internet of Things Cooperation Document Management Social Remote Workers Scam Data loss Customer Service Free Resource Project Management Windows 7 Patch Management Monitoring Save Money Microsoft 365 Remote Monitoring Going Green Vulnerability End of Support Vendor Management Solutions Windows 11 Physical Security Cybercrime YouTube Downloads Supply Chain Computer Repair Cryptocurrency Licensing Safety Holidays Entertainment Virtual Desktop Data Storage Data storage LiFi Video Conferencing Machine Learning Managed Services Provider Telephone System Outlook Virtual Machines Professional Services Cost Management Money Humor Data Privacy Maintenance Customer Relationship Management Antivirus iPhone Sports Mouse User Tip Modem Hacking Vulnerabilities Processor Presentation Mobile Security Administration Images 101 Wireless Technology Multi-Factor Authentication Robot Mobility Smart Technology Saving Time Settings IT Management Word Wireless Printing VPN Employees Content Filtering Meetings Integration Managed IT Service Alerts Displays Managing Costs Download Public Speaking Google Drive Lithium-ion battery Knowledge Point of Sale eCommerce SSID Virtual Assistant Browsers Connectivity Break Fix Surveillance Outsourcing Entrepreneur Network Management 5G Tech Support Virtual Machine Upload Social Network Google Docs Unified Communications Reviews Multi-Factor Security Experience Workplace Monitors Medical IT Transportation IoT Bitcoin Undo Dark Web Running Cable Development Hiring/Firing Websites Hypervisor Paperless Trends Google Wallet Customer Resource management Regulations Shopping Google Calendar Optimization Co-managed IT PowerPoint Technology Care Electronic Medical Records Employer/Employee Relationships Data Analysis Star Wars Windows 8 SharePoint Microsoft Excel Laptop Staff PCI DSS Business Communications Navigation Gamification Drones Social Networking Lenovo Gig Economy Application Legislation Scams Writing Hybrid Work Virtual Reality Teamwork Fileless Malware Halloween Internet Service Provider IBM Wearable Technology Server Management Regulations Compliance Private Cloud Human Resources Evernote Content Health IT Motherboard Superfish Comparison Identity Theft Memes Cables Twitter SQL Server Directions Assessment Hacks Permissions Scary Stories Net Neutrality Financial Data Fun Error History Google Apps Deep Learning Smartwatch Specifications IT IT Maintenance Social Engineering Business Intelligence Remote Computing Azure Microchip Internet Exlporer Competition Fraud Procurement Education Telework Cyber security Shortcuts Tech Username CES Black Friday Tablet Communitications Ransmoware Supply Chain Management Vendors Alert Database Mobile Computing IT Technicians Managed IT FinTech User Search File Sharing Be Proactive Dark Data Term Proxy Server Cookies Best Practice Cyber Monday IT Assessment Workforce How To Flexibility Threats Notifications Value Tactics Hotspot Buisness IP Address Mirgation IT solutions Organization Travel Workplace Strategies Legal Nanotechnology Business Growth Techology Digital Security Cameras Google Maps Smart Devices Meta Remote Working Amazon Memory Addiction Language Chatbots Recovery Cortana Unified Threat Management Data Breach Google Play Management Screen Reader Alt Codes Unified Threat Management Videos Hard Drives Distributed Denial of Service Electronic Health Records Outsource IT Environment Wasting Time Media Service Level Agreement Domains Computing Infrastructure Downtime Identity Hosted Solution Trend Micro Network Congestion Security Cameras Bookmark Smart Tech Typing User Error Refrigeration Software as a Service Small Businesses

Blog Archive