Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Productivity Microsoft Managed Service Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Covid-19 Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Tip of the week Managed Services Chrome Voice over Internet Protocol Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology 2FA Website Health Help Desk Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Physical Security Risk Management Virtual Private Network Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Free Resource Project Management Social Windows 7 Cooperation Microsoft 365 Going Green Patch Management Save Money Remote Monitoring Solutions End of Support Vulnerability Customer Service Vendor Management Cybercrime Display Processor Holidays Computer Repair Mobile Security Virtual Desktop Data Storage Data storage LiFi Supply Chain Video Conferencing Word Managed Services Provider Smart Technology Outlook Virtual Machines Professional Services Machine Learning Money Saving Time Humor Managed IT Service Safety Maintenance iPhone Sports Downloads Antivirus Mouse Vulnerabilities Licensing Data Privacy Entertainment Administration Images 101 Multi-Factor Authentication Mobility Robot Telephone System Customer Relationship Management Cost Management Settings Wireless Printing Employees Content Filtering Hacking IT Management Integration YouTube Meetings Presentation VPN Cryptocurrency Modem Wireless Technology User Tip IP Address Reviews Google Docs Unified Communications Database Medical IT Experience Development Bitcoin Network Management Transportation Small Businesses Running Cable Tech Support IT Technicians Hypervisor Displays Cookies Monitors Cyber Monday Google Wallet Proxy Server Shopping Recovery Optimization Tactics PowerPoint Hotspot Hard Drives Windows 8 Employer/Employee Relationships Outsourcing Laptop Websites Mirgation PCI DSS Drones Nanotechnology Navigation Domains Gig Economy SharePoint Addiction Workplace Electronic Medical Records Language Teamwork Hiring/Firing Halloween Chatbots Refrigeration Internet Service Provider Management Public Speaking Regulations Compliance Lenovo Screen Reader Evernote Paperless Writing Distributed Denial of Service Lithium-ion battery Memes Service Level Agreement Co-managed IT Virtual Reality Computing Infrastructure Entrepreneur SQL Server Technology Care Scary Stories Private Cloud Identity Net Neutrality Hacks Server Management Financial Data Superfish Bookmark History Identity Theft Smart Tech Business Communications Fun Smartwatch IT Deep Learning Download Scams Twitter Alerts Azure Hybrid Work Error Undo Procurement Telework Browsers Cyber security Education Connectivity Tech Human Resources Social Engineering Break Fix CES Communitications Upload Cables Remote Computing Multi-Factor Security Supply Chain Management Mobile Computing Social Network FinTech Tablet IoT Term Google Apps Search Dark Web Application IT Assessment Best Practice Trends IT Maintenance Alert Value Business Intelligence Buisness File Sharing Regulations Dark Data Google Calendar Flexibility Managed IT Customer Resource management IBM Organization Legal Data Analysis IT solutions Star Wars Shortcuts How To Microsoft Excel Digital Security Cameras Smart Devices Business Growth Gamification Ransmoware Notifications Staff Memory Vendors Travel Social Networking Legislation Remote Working Techology Fileless Malware Data Breach Google Maps Google Play Be Proactive Cortana Videos Electronic Health Records Alt Codes Content Workforce Wearable Technology Wasting Time Threats Downtime Unified Threat Management Motherboard Comparison Competition Health IT Unified Threat Management Directions Trend Micro Hosted Solution Assessment Security Cameras Workplace Strategies Permissions Software as a Service Typing Meta Managing Costs Amazon Network Congestion Specifications Google Drive User Error Microchip User eCommerce Internet Exlporer SSID Knowledge Fraud Surveillance Username Virtual Assistant Outsource IT Virtual Machine Environment Point of Sale Media 5G Black Friday

Blog Archive