Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

Continue reading

Should Efficiency Get In the Way of Due Process?

Should Efficiency Get In the Way of Due Process?

Technology is a double-edged sword: it supercharges business efficiency but also equips organizations like law enforcement with unprecedented power. Setting aside the immediate ethical debate, it is crucial to understand the sophisticated technologies certain agencies are leveraging in their operations; specifically, the advanced AI and data-mining platforms, such as those created by Palantir.

Continue reading

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Happy Global Wellness Day! Is Your Tech Working For or Against You?

Today is Global Wellness Day. As such, we wanted to invite you to consider a few ways to prioritize not just your mental and physical well-being, but your digital well-being as well. After all, technology is what keeps us connected to the world at large… and if we don’t approach it appropriately, it can create some challenges that we should all want to avoid.

Let’s talk about some simple best practices that can help promote workplace wellness and a healthier balance in our lives.

Continue reading

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy Workplace Tips IT Services Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Backup Ransomware Small Business Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Mobile Device Management Chrome Gmail Managed Services Voice over Internet Protocol Budget WiFi Networking Apple App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR HIPAA Applications Computing Hacker Information Technology Health Website Help Desk 2FA Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Router Operating System Physical Security Computers Virtual Private Network Risk Management Paperless Office Infrastructure Monitoring Windows 11 Document Management Excel Firewall Telephone Remote Workers Scam Data loss The Internet of Things Cooperation Social Free Resource Project Management Patch Management Windows 7 Save Money Remote Monitoring Going Green Vulnerability Microsoft 365 End of Support Vendor Management Solutions Customer Service Cybercrime Display Printer Holidays Virtual Desktop LiFi Smart Technology Data storage Data Storage Word Machine Learning Supply Chain Saving Time Video Conferencing Outlook Managed Services Provider Virtual Machines Professional Services Money Humor Managed IT Service Maintenance Antivirus Downloads Safety Licensing Sports iPhone Mouse Entertainment Administration Vulnerabilities Data Privacy Images 101 Telephone System Robot Cost Management Multi-Factor Authentication Mobility Customer Relationship Management Settings IT Management Wireless Printing VPN Content Filtering Meetings Hacking Presentation Employees YouTube User Tip Modem Integration Computer Repair Mobile Security Cryptocurrency Processor Wireless Technology IP Address Unified Communications Proxy Server Surveillance Experience Cookies Virtual Assistant Outsource IT Monitors Cyber Monday Google Docs Hotspot Media Bitcoin Running Cable Tactics Virtual Machine Environment Websites Mirgation Medical IT Google Wallet Reviews Recovery Development Nanotechnology Transportation Small Businesses Electronic Medical Records Language Windows 8 Hard Drives SharePoint Laptop Addiction Hypervisor Displays Management Optimization Chatbots PowerPoint Drones Domains Shopping Lenovo Screen Reader Employer/Employee Relationships Outsourcing Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Navigation Refrigeration PCI DSS Halloween Service Level Agreement Server Management Private Cloud Identity Workplace Public Speaking Gig Economy Lithium-ion battery Superfish Bookmark Internet Service Provider Identity Theft Smart Tech Teamwork Hiring/Firing Twitter Alerts Evernote Paperless Hacks Regulations Compliance Scary Stories Entrepreneur Download Memes Fun Error Co-managed IT Deep Learning Browsers Net Neutrality Connectivity SQL Server Technology Care Social Engineering Break Fix Remote Computing Business Communications Undo Financial Data Upload History Education Social Network IT Scams Multi-Factor Security Smartwatch Procurement Tablet IoT Azure Hybrid Work Dark Web Alert Tech Human Resources Mobile Computing Telework Trends Cyber security CES Managed IT Customer Resource management Communitications Search File Sharing Regulations Cables Dark Data Google Calendar Best Practice Application Data Analysis Supply Chain Management Star Wars How To Microsoft Excel Gamification Notifications Staff Term Google Apps FinTech Buisness IT solutions IT Assessment Travel Social Networking IT Maintenance Legislation Legal IBM Business Growth Techology Fileless Malware Flexibility Google Maps Value Business Intelligence Content Wearable Technology Shortcuts Organization Digital Security Cameras Health IT Smart Devices Cortana Unified Threat Management Motherboard Ransmoware Comparison Permissions Alt Codes Unified Threat Management Directions Remote Working Assessment Memory Vendors Data Breach Google Play Be Proactive Competition Downtime Videos Hosted Solution Electronic Health Records Workforce Network Congestion Specifications Fraud Typing User Error Microchip Internet Exlporer Wasting Time Threats Username Trend Micro Security Cameras Workplace Strategies User Software as a Service Knowledge Point of Sale Meta Black Friday Google Drive Database Managing Costs Amazon Network Management eCommerce 5G Tech Support IT Technicians SSID

Blog Archive