Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Covid-19 Gadgets Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Government Data Management Business Continuity Virtualization Business Technology Wi-Fi Windows 10 Bandwidth Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security WiFi Apple BYOD App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Networking Chrome Gmail Budget HIPAA Applications Access Control Computing Hacker Information Technology Conferencing Avoiding Downtime Marketing Office 365 How To BDR Bring Your Own Device Big Data Router Virtual Private Network Health Operating System 2FA Help Desk Computers Risk Management Retail Website Healthcare Analytics Office Tips Managed IT Services Augmented Reality Storage Password The Internet of Things Remote Monitoring Vulnerability End of Support Vendor Management Solutions Social Physical Security Display Printer Going Green Windows 11 Paperless Office Infrastructure Customer Service Monitoring Cybercrime Excel Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Mouse IT Management Administration VPN Employees Meetings Integration User Tip Modem Computer Repair Mobile Security Processor Customer Relationship Management Holidays Settings Wireless Printing Data Storage Content Filtering Smart Technology Supply Chain Hacking Video Conferencing YouTube Presentation Machine Learning Managed Services Provider Professional Services Saving Time Cryptocurrency Virtual Machines Wireless Technology Managed IT Service Maintenance Virtual Desktop Data storage Antivirus LiFi Downloads iPhone Word Licensing Outlook Vulnerabilities Entertainment Money Data Privacy Humor Images 101 Safety Telephone System Multi-Factor Authentication Robot Mobility Sports Cost Management Content Remote Working Education Wearable Technology Memory Vendors Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Mobile Computing Assessment Electronic Health Records Wasting Time Threats Search Application Best Practice Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Buisness Fraud Meta User Error Microchip Internet Exlporer Software as a Service IBM Legal Username IT solutions Managing Costs Amazon Business Growth Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Network Management Tech Support IT Technicians Virtual Machine Environment Cortana Media Monitors Cyber Monday Medical IT Proxy Server Reviews Alt Codes Cookies Tactics Development Downtime Hotspot Transportation Small Businesses Competition Hosted Solution Websites Mirgation Hypervisor Displays PowerPoint Shopping Typing Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Google Drive Management PCI DSS User Chatbots Knowledge Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing 5G IP Address Google Docs Server Management Regulations Compliance Unified Communications Private Cloud Identity Experience Evernote Paperless Running Cable Co-managed IT Superfish Bookmark Bitcoin Identity Theft Smart Tech Memes Google Wallet Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Recovery Error History Business Communications Laptop Social Engineering Break Fix Scams Browsers Smartwatch Hard Drives Windows 8 Connectivity IT Domains Drones Upload Procurement Remote Computing Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Halloween Dark Web Cables CES Refrigeration Tablet IoT Communitications Public Speaking Trends Supply Chain Management Alert Lithium-ion battery Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Entrepreneur Scary Stories How To Microsoft Excel IT Maintenance Data Analysis Hacks Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Fun Organization Deep Learning Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Undo Google Maps Smart Devices

Blog Archive