Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips IT Services Internet Malware Workplace Tips Phishing IT Support Privacy Google Email Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Managed Service AI Users Ransomware Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Facebook Holiday Training Automation Artificial Intelligence Outsourced IT Covid-19 Gadgets Cloud Computing Compliance Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Bandwidth Blockchain Virtualization Vendor Wi-Fi Business Technology Windows 10 Data Security Apps Managed Services Two-factor Authentication Mobile Office Tip of the week Gmail Budget WiFi Networking Apple App Employer-Employee Relationship BYOD Voice over Internet Protocol Mobile Device Management Chrome Password Managed IT Services HIPAA How To BDR Applications Computing Physical Security Hacker Information Technology Avoiding Downtime Conferencing Marketing Access Control Office 365 Retail Storage Bring Your Own Device Big Data Router 2FA Operating System Help Desk Computers Virtual Private Network Risk Management Website Health Healthcare Analytics Office Tips Augmented Reality Windows 7 Microsoft 365 The Internet of Things Scam Data loss Solutions Social Patch Management Going Green Save Money Remote Monitoring Windows 11 End of Support Vulnerability Monitoring Vendor Management Customer Service Cybercrime Excel Display Printer Remote Workers Managed IT Service Paperless Office Infrastructure Telephone Cooperation Free Resource Firewall Document Management Project Management Images 101 Safety Maintenance Telephone System Multi-Factor Authentication Mobility Antivirus Sports Cost Management Mouse Administration Employees Integration User Tip Modem Robot Mobile Security Processor Customer Relationship Management Settings Holidays Wireless Printing Data Storage Content Filtering Hacking IT Management Smart Technology Supply Chain Presentation VPN YouTube Meetings Video Conferencing Managed Services Provider Cryptocurrency Saving Time Virtual Machines Professional Services Wireless Technology Computer Repair Virtual Desktop LiFi Downloads Data storage iPhone Licensing Word Outlook Vulnerabilities Entertainment Machine Learning Data Privacy Money Humor Microsoft Excel IT Maintenance Server Management Hacks Data Analysis Entrepreneur Scary Stories Private Cloud Star Wars IT Assessment Identity Theft Gamification Flexibility Fun Staff Value Business Intelligence Superfish Deep Learning Organization Twitter Social Networking Legislation Shortcuts Ransmoware Undo Fileless Malware Digital Security Cameras Error Smart Devices Education Content Remote Working Social Engineering Wearable Technology Memory Vendors Health IT Remote Computing Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Mobile Computing Directions Videos Assessment Electronic Health Records Tablet Search Wasting Time Threats Application Best Practice Alert Trend Micro Specifications Security Cameras Workplace Strategies Dark Data Fraud Meta Managed IT Microchip Buisness File Sharing Internet Exlporer Software as a Service IT solutions Username How To Managing Costs Amazon IBM Legal Business Growth Notifications eCommerce Black Friday SSID Virtual Assistant Outsource IT Travel Database Surveillance Google Maps Cortana IT Technicians Virtual Machine Environment Media Techology Alt Codes Proxy Server Reviews Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Competition Downtime Unified Threat Management Tactics Development Hosted Solution Mirgation Hypervisor Displays Unified Threat Management Typing Shopping Nanotechnology Optimization PowerPoint Network Congestion Language Employer/Employee Relationships Outsourcing Addiction User Management PCI DSS Knowledge Chatbots Navigation User Error Google Drive Gig Economy Screen Reader Distributed Denial of Service Workplace 5G Computing Infrastructure Teamwork Hiring/Firing Point of Sale Service Level Agreement Internet Service Provider Unified Communications Regulations Compliance Experience Identity Evernote Paperless IP Address Google Docs Network Management Bitcoin Bookmark Running Cable Tech Support Smart Tech Memes Co-managed IT Download Net Neutrality Monitors Alerts SQL Server Technology Care Google Wallet Recovery Financial Data History Business Communications Break Fix Scams Hard Drives Windows 8 Browsers Smartwatch Laptop Websites Connectivity IT Upload Procurement Azure Hybrid Work Domains Drones Social Network Telework Electronic Medical Records Cyber security Multi-Factor Security Tech Human Resources SharePoint Dark Web Cables Refrigeration CES Halloween IoT Communitications Trends Supply Chain Management Writing Public Speaking Lenovo Customer Resource management FinTech Virtual Reality Regulations Google Calendar Term Google Apps Lithium-ion battery

Blog Archive