Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Phishing Privacy Computer Google Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Passwords Quick Tips AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Automation Facebook Artificial Intelligence Holiday Training Covid-19 Gadgets Compliance Cloud Computing Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Virtualization Bandwidth Blockchain Wi-Fi Two-factor Authentication Apps Managed Services Data Security Mobile Office Vendor Gmail Tip of the week WiFi Chrome Budget Employer-Employee Relationship Voice over Internet Protocol Apple Networking App BYOD Mobile Device Management Access Control Office 365 Conferencing Password Managed IT Services How To BDR Hacker Avoiding Downtime HIPAA Marketing Computing Physical Security Applications Information Technology Health Help Desk Office Tips Analytics Augmented Reality Big Data 2FA Retail Storage Bring Your Own Device Healthcare Computers Operating System Website Router Virtual Private Network Risk Management Solutions Printer Firewall Paperless Office Infrastructure Monitoring The Internet of Things Document Management Windows 11 Social Managed IT Service Telephone Excel Scam Data loss Remote Workers Cooperation Customer Service Going Green Patch Management Save Money Free Resource Remote Monitoring Vulnerability Project Management End of Support Windows 7 Vendor Management Cybercrime Microsoft 365 Display Processor Computer Repair Mobile Security Employees Virtual Desktop Integration Data storage LiFi Safety Smart Technology Outlook Machine Learning Money Saving Time Holidays Humor Data Storage Supply Chain Video Conferencing Maintenance Antivirus Sports Managed Services Provider Downloads Professional Services Mouse Virtual Machines Licensing Customer Relationship Management Entertainment Administration Hacking iPhone Presentation Telephone System Robot Vulnerabilities Wireless Technology Cost Management Settings Data Privacy Printing Wireless Images 101 Content Filtering IT Management VPN YouTube Meetings Multi-Factor Authentication Mobility Word Cryptocurrency User Tip Modem Workforce Google Docs Public Speaking Videos Unified Communications Database Electronic Health Records Experience Bitcoin Network Management Running Cable Tech Support IT Technicians Wasting Time Threats Lithium-ion battery Google Wallet Proxy Server Cookies Entrepreneur Trend Micro Monitors Cyber Monday Security Cameras Workplace Strategies Hotspot Meta Tactics Software as a Service Windows 8 Laptop Websites Mirgation Managing Costs Amazon Drones Undo Nanotechnology eCommerce SSID Electronic Medical Records Language Virtual Assistant Outsource IT SharePoint Addiction Surveillance Management Halloween Chatbots Virtual Machine Environment Media Lenovo Reviews Screen Reader Writing Distributed Denial of Service Medical IT Development Virtual Reality Computing Infrastructure Transportation Small Businesses Service Level Agreement Hacks Server Management Application Scary Stories Private Cloud Identity Hypervisor Displays PowerPoint Superfish Bookmark Shopping Identity Theft Smart Tech Optimization Fun Twitter Alerts Employer/Employee Relationships Outsourcing IBM Deep Learning Download PCI DSS Error Navigation Workplace Browsers Gig Economy Education Connectivity Social Engineering Break Fix Internet Service Provider Remote Computing Teamwork Hiring/Firing Upload Mobile Computing Social Network Regulations Compliance Multi-Factor Security Evernote Paperless Co-managed IT Competition Tablet IoT Memes Search Dark Web Net Neutrality Alert SQL Server Technology Care Best Practice Trends Managed IT Customer Resource management Financial Data Buisness File Sharing Regulations History Dark Data Google Calendar Business Communications Scams Legal Data Analysis Smartwatch IT solutions Star Wars IT How To Microsoft Excel User Procurement Notifications Staff Azure Hybrid Work Business Growth Gamification Telework Travel Social Networking Cyber security Legislation Tech Human Resources Cables Techology Fileless Malware CES Google Maps Communitications Cortana Supply Chain Management Wearable Technology IP Address Alt Codes Content Health IT FinTech Downtime Unified Threat Management Motherboard Comparison Term Google Apps IT Maintenance Unified Threat Management Directions Hosted Solution Assessment IT Assessment Permissions Recovery Flexibility Value Business Intelligence Typing Hard Drives Organization Network Congestion Specifications Shortcuts Ransmoware Google Drive User Error Microchip Domains Digital Security Cameras Internet Exlporer Smart Devices Knowledge Fraud Remote Working Memory Vendors Username Refrigeration Point of Sale Data Breach 5G Black Friday Google Play Be Proactive

Blog Archive