Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Passwords Quick Tips Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Covid-19 Training Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Vendor Mobile Office Two-factor Authentication Apps App BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Managed Services Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking BDR Hacker Avoiding Downtime HIPAA Computing Marketing Applications Information Technology Access Control Office 365 Conferencing How To Computers Operating System Router Website Virtual Private Network Risk Management Health 2FA Help Desk Analytics Office Tips Augmented Reality Retail Big Data Storage Healthcare Password Bring Your Own Device Managed IT Services Windows 7 Customer Service Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Physical Security Display Printer Firewall Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management The Internet of Things Remote Workers Social Telephone Scam Data loss Cooperation Free Resource Project Management Images 101 Hacking Multi-Factor Authentication Mobility Telephone System Presentation Robot Cost Management Settings Printing Wireless Technology Wireless Content Filtering IT Management VPN YouTube Meetings Employees Integration Cryptocurrency User Tip Modem Word Computer Repair Mobile Security Processor Holidays Virtual Desktop Data storage LiFi Data Storage Supply Chain Smart Technology Safety Video Conferencing Outlook Managed Services Provider Machine Learning Virtual Machines Professional Services Money Saving Time Humor Managed IT Service Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Administration Customer Relationship Management Data Privacy How To Microsoft Excel IT Assessment IT Maintenance Legal Data Analysis IT solutions Star Wars Business Growth Gamification Notifications Staff Flexibility Value Business Intelligence Shortcuts Travel Social Networking Legislation Organization Cortana Digital Security Cameras User Smart Devices Ransmoware Techology Fileless Malware Google Maps Alt Codes Content Wearable Technology Remote Working Memory Vendors Data Breach Google Play Be Proactive Health IT Downtime Unified Threat Management Motherboard Comparison Permissions Videos Electronic Health Records Workforce Unified Threat Management Directions Hosted Solution Assessment IP Address Typing Wasting Time Threats Trend Micro Security Cameras Workplace Strategies Network Congestion Specifications Knowledge Fraud Recovery Software as a Service Meta Google Drive User Error Microchip Internet Exlporer Username Hard Drives Managing Costs Amazon eCommerce SSID Point of Sale Domains 5G Black Friday Experience Surveillance Virtual Assistant Outsource IT Google Docs Unified Communications Database Media Bitcoin Network Management Running Cable Tech Support IT Technicians Refrigeration Virtual Machine Environment Reviews Medical IT Google Wallet Proxy Server Cookies Public Speaking Monitors Cyber Monday Lithium-ion battery Hotspot Development Transportation Small Businesses Tactics Hypervisor Displays Windows 8 Laptop Websites Mirgation Entrepreneur Shopping Optimization PowerPoint Drones Nanotechnology Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Navigation Management Halloween Chatbots Undo PCI DSS Writing Distributed Denial of Service Gig Economy Workplace Lenovo Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Hacks Server Management Scary Stories Private Cloud Identity Regulations Compliance Fun Memes Co-managed IT Superfish Bookmark Identity Theft Smart Tech Deep Learning Download Twitter Alerts Application Net Neutrality SQL Server Technology Care History Business Communications Error Financial Data Social Engineering Break Fix Smartwatch IT Scams Browsers Education Connectivity IBM Upload Remote Computing Procurement Azure Hybrid Work Cyber security Tech Human Resources Mobile Computing Social Network Multi-Factor Security Telework Search Dark Web CES Communitications Cables Tablet IoT Best Practice Trends Alert Supply Chain Management Term Google Apps Managed IT Customer Resource management Buisness File Sharing Regulations Competition Dark Data Google Calendar FinTech

Blog Archive