Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Business Technology Windows 10 Virtualization Apps Data Security Two-factor Authentication Vendor Mobile Office Managed Services Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Tip of the week Gmail Apple WiFi App Voice over Internet Protocol Networking How To Computing BDR Information Technology Hacker HIPAA Physical Security Office 365 Applications Avoiding Downtime Marketing Access Control Conferencing Managed IT Services Operating System Healthcare Risk Management Computers Router Analytics Office Tips Virtual Private Network Website Augmented Reality Health Storage Help Desk Password Bring Your Own Device 2FA Retail Big Data Cooperation Cybercrime Patch Management Save Money Remote Monitoring Customer Service Free Resource Project Management Vulnerability End of Support Vendor Management Windows 7 Microsoft 365 Display Solutions Printer Paperless Office Infrastructure Monitoring Firewall Windows 11 Document Management Managed IT Service The Internet of Things Excel Telephone Scam Going Green Data loss Social Remote Workers Content Filtering YouTube iPhone Customer Relationship Management Telephone System Cryptocurrency Robot Vulnerabilities Cost Management Data Privacy Hacking Presentation Images 101 Virtual Desktop IT Management Data storage LiFi Multi-Factor Authentication Mobility VPN Meetings Wireless Technology Outlook User Tip Modem Money Computer Repair Mobile Security Processor Humor Employees Word Integration Smart Technology Sports Mouse Machine Learning Holidays Saving Time Administration Safety Data Storage Supply Chain Maintenance Video Conferencing Managed Services Provider Antivirus Downloads Virtual Machines Professional Services Licensing Settings Wireless Entertainment Printing Trends IBM Alert Hosted Solution Net Neutrality SQL Server Technology Care History Business Communications Managed IT Customer Resource management File Sharing Regulations Typing Financial Data Dark Data Google Calendar Smartwatch How To Microsoft Excel IT Scams Data Analysis Star Wars Gamification Google Drive Notifications Staff Procurement Knowledge Azure Hybrid Work Cyber security Tech Human Resources Travel Social Networking Telework Legislation Competition CES Communitications 5G Cables Techology Fileless Malware Google Maps Content Google Docs Wearable Technology Unified Communications Supply Chain Management Experience Running Cable Term Google Apps Health IT Unified Threat Management Motherboard Bitcoin FinTech Comparison Google Wallet Permissions IT Assessment IT Maintenance Unified Threat Management Directions Assessment User Flexibility Value Business Intelligence Laptop Shortcuts Windows 8 Organization Network Congestion Specifications Internet Exlporer Drones Digital Security Cameras Fraud Smart Devices Ransmoware User Error Microchip Username IP Address Remote Working Memory Vendors Black Friday Halloween Data Breach Google Play Be Proactive Point of Sale Database Videos Electronic Health Records Workforce Network Management Tech Support IT Technicians Recovery Wasting Time Threats Monitors Cyber Monday Scary Stories Trend Micro Security Cameras Workplace Strategies Proxy Server Cookies Hacks Hard Drives Tactics Domains Hotspot Software as a Service Fun Meta Websites Mirgation Deep Learning Managing Costs Amazon eCommerce SSID Nanotechnology Refrigeration Addiction Public Speaking Electronic Medical Records Language Education Surveillance Virtual Assistant Outsource IT SharePoint Media Management Lithium-ion battery Chatbots Virtual Machine Environment Reviews Writing Distributed Denial of Service Entrepreneur Medical IT Lenovo Screen Reader Mobile Computing Service Level Agreement Virtual Reality Computing Infrastructure Development Search Transportation Small Businesses Hypervisor Displays Server Management Private Cloud Identity Best Practice Undo Shopping Buisness Optimization PowerPoint Superfish Bookmark Identity Theft Smart Tech Download Legal Twitter Alerts IT solutions Employer/Employee Relationships Outsourcing Navigation Error Business Growth PCI DSS Gig Economy Social Engineering Break Fix Workplace Browsers Connectivity Upload Remote Computing Internet Service Provider Cortana Teamwork Hiring/Firing Evernote Paperless Social Network Alt Codes Application Regulations Compliance Multi-Factor Security Dark Web Downtime Memes Co-managed IT Tablet IoT

Blog Archive