Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Ransomware Mobile Device Productivity Microsoft Managed Service Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Holiday Miscellaneous Automation Artificial Intelligence Information Cloud Computing Training Gadgets Covid-19 Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Virtualization Business Technology Blockchain Bandwidth Two-factor Authentication Apps Vendor Mobile Office Data Security Mobile Device Management Gmail BYOD Managed Services Voice over Internet Protocol WiFi Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Conferencing Computing Information Technology Access Control Office 365 HIPAA Hacker Applications Avoiding Downtime How To Marketing BDR 2FA Help Desk Operating System Physical Security Risk Management Healthcare Virtual Private Network Big Data Health Analytics Office Tips Augmented Reality Retail Storage Computers Password Router Bring Your Own Device Managed IT Services Website Monitoring Going Green Patch Management Save Money Firewall Remote Monitoring End of Support Excel Vulnerability Vendor Management Cybercrime Remote Workers The Internet of Things Telephone Display Printer Social Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Customer Service Solutions Scam Data loss Windows 11 Data Storage Robot Smart Technology Supply Chain Video Conferencing Settings Managed Services Provider Wireless Printing Saving Time Virtual Machines Content Filtering Professional Services IT Management YouTube Meetings Safety VPN Managed IT Service Cryptocurrency Downloads Computer Repair iPhone Licensing Virtual Desktop Data storage Entertainment LiFi Vulnerabilities Data Privacy Outlook Images 101 Machine Learning Customer Relationship Management Money Telephone System Multi-Factor Authentication Mobility Humor Cost Management Hacking Presentation Maintenance Sports Antivirus Mouse Employees Integration Wireless Technology User Tip Administration Modem Mobile Security Processor Holidays Word Travel Mirgation Hypervisor Displays Refrigeration Techology Shopping Google Maps Nanotechnology Optimization Cortana PowerPoint Language Employer/Employee Relationships Outsourcing Public Speaking Alt Codes Addiction Management PCI DSS Downtime Unified Threat Management Chatbots Navigation Lithium-ion battery Unified Threat Management Entrepreneur Gig Economy Hosted Solution Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Typing Service Level Agreement Internet Service Provider Regulations Compliance Identity Network Congestion Evernote Paperless Undo Google Drive User Error Bookmark Smart Tech Memes Knowledge Co-managed IT Alerts SQL Server Technology Care Download Net Neutrality Financial Data Point of Sale History 5G Business Communications Google Docs Browsers Smartwatch Unified Communications Connectivity IT Experience Break Fix Scams Azure Hybrid Work Bitcoin Network Management Upload Procurement Running Cable Tech Support Social Network Telework Cyber security Monitors Multi-Factor Security Tech Human Resources Application Google Wallet CES IoT Communitications Dark Web Cables IBM Windows 8 Trends Supply Chain Management Laptop Websites Drones Customer Resource management FinTech Regulations Google Calendar Term Google Apps SharePoint Data Analysis Star Wars IT Assessment Electronic Medical Records Microsoft Excel IT Maintenance Halloween Staff Value Business Intelligence Gamification Flexibility Lenovo Organization Social Networking Writing Legislation Shortcuts Competition Fileless Malware Digital Security Cameras Smart Devices Virtual Reality Ransmoware Content Remote Working Scary Stories Private Cloud Wearable Technology Memory Vendors Hacks Server Management Superfish Health IT Identity Theft Motherboard Data Breach Fun Comparison Google Play Be Proactive Permissions Workforce Directions Videos Deep Learning Assessment Electronic Health Records Twitter Error Wasting Time Threats User Education Trend Micro Social Engineering Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Internet Exlporer Software as a Service Remote Computing Username Managing Costs Amazon IP Address Mobile Computing Tablet eCommerce Search Black Friday SSID Virtual Assistant Outsource IT Best Practice Database Surveillance Alert Buisness File Sharing IT Technicians Virtual Machine Environment Dark Data Media Recovery Managed IT Hard Drives Legal Proxy Server Reviews IT solutions Cookies How To Cyber Monday Medical IT Hotspot Transportation Small Businesses Domains Business Growth Tactics Development Notifications

Blog Archive