Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Holiday Information Facebook Artificial Intelligence Automation Gadgets Covid-19 Cloud Computing Training Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Wi-Fi Blockchain Windows 10 Virtualization Business Technology Apps Data Security Mobile Office Two-factor Authentication Vendor Managed Services Tip of the week Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking App Mobile Device Management BYOD Gmail WiFi Chrome Conferencing Hacker How To Avoiding Downtime BDR Marketing Computing Information Technology HIPAA Office 365 Applications Access Control Storage Healthcare Help Desk Password Bring Your Own Device Retail Computers Managed IT Services Website Operating System Risk Management Virtual Private Network Router Analytics Office Tips 2FA Health Augmented Reality Big Data Social Remote Workers Monitoring Document Management Free Resource Customer Service Scam Data loss Project Management Windows 7 Telephone Going Green Microsoft 365 Cooperation Patch Management Solutions Save Money Cybercrime Remote Monitoring Vulnerability End of Support Vendor Management Firewall Physical Security Display Printer Windows 11 The Internet of Things Paperless Office Infrastructure Excel Machine Learning Sports Smart Technology iPhone Mouse Customer Relationship Management Maintenance Saving Time Administration Antivirus Vulnerabilities Managed IT Service Hacking Data Privacy Images 101 Presentation Downloads Multi-Factor Authentication Mobility Licensing Wireless Technology Settings Wireless Entertainment Printing Content Filtering Robot Employees YouTube Word Integration Telephone System Cryptocurrency IT Management Cost Management VPN Meetings Holidays Virtual Desktop LiFi Data storage Computer Repair Safety Data Storage Video Conferencing Outlook Managed Services Provider User Tip Modem Supply Chain Mobile Security Virtual Machines Professional Services Processor Money Humor Electronic Medical Records Evernote Proxy Server Hacks Application Cookies SharePoint Scary Stories Workplace Cyber Monday Regulations Compliance Hiring/Firing Hotspot Fun Memes Tactics IBM Deep Learning Mirgation Lenovo Paperless Net Neutrality Writing SQL Server Virtual Reality History Nanotechnology Co-managed IT Financial Data Addiction Education Technology Care Language Server Management Smartwatch Private Cloud IT Management Chatbots Superfish Business Communications Identity Theft Procurement Azure Distributed Denial of Service Telework Twitter Cyber security Tech Mobile Computing Screen Reader Scams Service Level Agreement Hybrid Work Computing Infrastructure Search CES Error Communitications Competition Social Engineering Best Practice Identity Human Resources Supply Chain Management FinTech Remote Computing Term Bookmark Smart Tech Buisness Cables Download IT solutions Alerts IT Assessment Legal Value Business Growth User Google Apps Tablet Flexibility Break Fix Organization Alert Browsers Connectivity IT Maintenance Upload Business Intelligence Managed IT Cortana Digital Security Cameras File Sharing Smart Devices Dark Data How To Memory IP Address Social Network Alt Codes Shortcuts Multi-Factor Security Remote Working Dark Web Notifications Data Breach Google Play IoT Downtime Ransmoware Trends Hosted Solution Vendors Videos Travel Electronic Health Records Wasting Time Customer Resource management Typing Recovery Regulations Techology Be Proactive Google Calendar Google Maps Microsoft Excel Trend Micro Security Cameras Data Analysis Hard Drives Star Wars Workforce Domains Gamification Threats Staff Knowledge Unified Threat Management Software as a Service Google Drive Managing Costs Social Networking Unified Threat Management Workplace Strategies Legislation 5G eCommerce SSID Fileless Malware Refrigeration Meta Public Speaking Content Unified Communications Amazon Wearable Technology Experience Surveillance Network Congestion Virtual Assistant Google Docs Virtual Machine Lithium-ion battery Health IT Bitcoin Motherboard User Error Running Cable Comparison Outsource IT Entrepreneur Permissions Reviews Medical IT Directions Google Wallet Assessment Environment Media Point of Sale Development Transportation Hypervisor Windows 8 Laptop Specifications Small Businesses Fraud Network Management Shopping Tech Support Optimization PowerPoint Microchip Drones Undo Internet Exlporer Username Displays Monitors Employer/Employee Relationships Navigation Halloween Black Friday PCI DSS Outsourcing Gig Economy Websites Database IT Technicians Internet Service Provider Teamwork

Blog Archive