Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Communication Cybersecurity Saving Money Managed Service Smartphone Data Backup Android Upgrade AI Data Recovery VoIP Business Management Smartphones Disaster Recovery communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Miscellaneous Information Automation Artificial Intelligence Cloud Computing Gadgets Holiday Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Data Management Government Business Continuity Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Vendor Apps Two-factor Authentication Mobile Office Gmail Apple Networking App BYOD Employer-Employee Relationship Managed Services Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management How To BDR WiFi HIPAA Computing Applications Information Technology Hacker Access Control Office 365 Avoiding Downtime Marketing Conferencing Managed IT Services Big Data 2FA Operating System Router Virtual Private Network Risk Management Healthcare Computers Health Help Desk Analytics Office Tips Augmented Reality Website Retail Storage Password Bring Your Own Device Cooperation The Internet of Things Going Green Patch Management Windows 11 Save Money Remote Monitoring Social End of Support Vulnerability Vendor Management Excel Cybercrime Physical Security Display Remote Workers Customer Service Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Windows 7 Document Management Microsoft 365 Telephone Firewall Scam Solutions Data loss Employees Entertainment Integration Administration Safety Robot Holidays Telephone System Cost Management Data Storage Settings Wireless Printing Supply Chain Content Filtering Video Conferencing Managed Services Provider IT Management Virtual Machines VPN Professional Services YouTube Meetings Customer Relationship Management Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Hacking iPhone Virtual Desktop Presentation LiFi Data storage Smart Technology Vulnerabilities Wireless Technology Data Privacy Outlook Machine Learning Images 101 Money Saving Time Humor Multi-Factor Authentication Mobility Managed IT Service Word Maintenance Antivirus Sports Downloads Mouse Licensing Entrepreneur Trend Micro Mobile Computing Social Network Security Cameras Workplace Strategies Multi-Factor Security Search Dark Web Software as a Service Meta Tablet IoT Managing Costs Amazon Best Practice Trends Alert eCommerce Managed IT Customer Resource management SSID Buisness File Sharing Regulations Undo Dark Data Google Calendar IT solutions Star Wars How To Microsoft Excel Surveillance Legal Data Analysis Virtual Assistant Outsource IT Virtual Machine Environment Business Growth Gamification Media Notifications Staff Legislation Reviews Medical IT Travel Social Networking Google Maps Cortana Development Techology Fileless Malware Transportation Small Businesses Hypervisor Displays Alt Codes Content Wearable Technology Application Comparison Shopping Optimization Health IT PowerPoint Downtime Unified Threat Management Motherboard Employer/Employee Relationships Outsourcing Hosted Solution Assessment IBM Permissions Unified Threat Management Directions PCI DSS Typing Navigation Network Congestion Specifications Gig Economy Workplace Teamwork Hiring/Firing Internet Exlporer Knowledge Fraud Internet Service Provider Google Drive User Error Microchip Regulations Compliance Username Evernote Paperless 5G Black Friday Memes Co-managed IT Point of Sale Competition SQL Server Technology Care Unified Communications Database Experience Net Neutrality Google Docs Financial Data History Bitcoin Network Management Business Communications Running Cable Tech Support IT Technicians Monitors Cyber Monday Smartwatch IT Google Wallet Proxy Server Scams Cookies Azure Hybrid Work Tactics Hotspot User Procurement Telework Cyber security Windows 8 Tech Human Resources Laptop Websites Mirgation CES Communitications Drones Cables Nanotechnology Addiction IP Address Electronic Medical Records Language Supply Chain Management SharePoint FinTech Management Term Google Apps Halloween Chatbots Writing Distributed Denial of Service IT Assessment Lenovo IT Maintenance Screen Reader Value Business Intelligence Service Level Agreement Virtual Reality Computing Infrastructure Recovery Flexibility Organization Hacks Server Management Shortcuts Scary Stories Private Cloud Identity Hard Drives Domains Fun Digital Security Cameras Smart Devices Superfish Bookmark Ransmoware Identity Theft Smart Tech Memory Vendors Deep Learning Download Twitter Alerts Remote Working Data Breach Google Play Be Proactive Error Refrigeration Public Speaking Social Engineering Break Fix Videos Electronic Health Records Browsers Workforce Education Connectivity Wasting Time Threats Upload Lithium-ion battery Remote Computing

Blog Archive