Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Passwords Cybersecurity Communication Data Backup Smartphone AI Android Data Recovery Upgrade Disaster Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Automation Miscellaneous Information Artificial Intelligence Covid-19 Training Gadgets Cloud Computing Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Wi-Fi Business Technology Virtualization Blockchain Bandwidth Two-factor Authentication Apps Vendor Data Security Mobile Office Mobile Device Management App Gmail WiFi Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Chrome Networking Budget Apple BYOD Access Control Computing Information Technology HIPAA Office 365 Applications How To Hacker BDR Avoiding Downtime Marketing Conferencing 2FA Virtual Private Network Operating System Health Risk Management Big Data Retail Router Analytics Office Tips Augmented Reality Managed IT Services Healthcare Computers Storage Password Help Desk Bring Your Own Device Website Physical Security Telephone Firewall Solutions Going Green Display Excel Printer Paperless Office Cooperation Infrastructure Cybercrime The Internet of Things Document Management Social Scam Remote Workers Data loss Customer Service Monitoring Free Resource Patch Management Project Management Save Money Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Windows 11 Microsoft 365 VPN Meetings Downloads Supply Chain Licensing Employees Computer Repair Settings Entertainment Wireless Integration Printing Content Filtering Safety YouTube Holidays Cryptocurrency Telephone System Cost Management Machine Learning Data Storage Data Privacy Virtual Desktop Video Conferencing Managed Services Provider Data storage LiFi Maintenance Virtual Machines Professional Services Customer Relationship Management Antivirus Outlook Modem User Tip Money Processor Mobile Security Hacking Humor Presentation iPhone Sports Wireless Technology Smart Technology Vulnerabilities Mouse Robot Images 101 Saving Time Administration Multi-Factor Authentication Mobility IT Management Managed IT Service Word Memory Legal Network Congestion Displays IT solutions Download Alerts Remote Working Refrigeration Data Breach Google Play Business Growth User Error Browsers Outsourcing Connectivity Videos Public Speaking Break Fix Electronic Health Records Wasting Time Upload Cortana Lithium-ion battery Point of Sale Multi-Factor Security Trend Micro Entrepreneur Security Cameras Alt Codes Social Network Workplace Hiring/Firing Downtime IoT Network Management Dark Web Software as a Service Tech Support Managing Costs Monitors Hosted Solution Trends Paperless Regulations Undo Google Calendar eCommerce SSID Typing Customer Resource management Co-managed IT Data Analysis Technology Care Star Wars Microsoft Excel Surveillance Websites Virtual Assistant Virtual Machine Google Drive Gamification Business Communications Knowledge Staff SharePoint Social Networking Reviews Legislation Electronic Medical Records Medical IT Scams Fileless Malware Hybrid Work 5G Development Transportation Application Hypervisor Google Docs Writing Unified Communications Content Human Resources Experience Lenovo Wearable Technology Motherboard Shopping Comparison Optimization Virtual Reality PowerPoint Bitcoin Health IT Cables Running Cable Directions Assessment IBM Server Management Permissions Private Cloud Employer/Employee Relationships Google Wallet Identity Theft Navigation Google Apps Superfish PCI DSS Gig Economy Specifications Twitter Windows 8 IT Maintenance Laptop Drones Microchip Business Intelligence Internet Exlporer Fraud Internet Service Provider Error Teamwork Social Engineering Evernote Username Shortcuts Regulations Compliance Halloween Competition Black Friday Memes Remote Computing Ransmoware Vendors Database Net Neutrality SQL Server Financial Data Tablet History Be Proactive IT Technicians Workforce Scary Stories Cookies Smartwatch Cyber Monday IT Alert Hacks Proxy Server Azure Dark Data Threats Tactics Fun Managed IT Hotspot Procurement User File Sharing Telework Cyber security How To Tech Deep Learning Workplace Strategies Mirgation Meta Nanotechnology CES Communitications Notifications Amazon Education Addiction IP Address Language Supply Chain Management Travel FinTech Google Maps Term Management Techology Chatbots Outsource IT Screen Reader Distributed Denial of Service IT Assessment Mobile Computing Value Environment Service Level Agreement Media Search Computing Infrastructure Flexibility Recovery Unified Threat Management Organization Hard Drives Best Practice Unified Threat Management Identity Bookmark Small Businesses Buisness Smart Tech Digital Security Cameras Domains Smart Devices

Blog Archive