Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Android Disaster Recovery Data Recovery Upgrade Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Cloud Computing Covid-19 Training Compliance Server Remote Work Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Blockchain Wi-Fi Business Technology Windows 10 Apps Data Security Vendor Mobile Office Two-factor Authentication Gmail Tip of the week Chrome Managed Services Budget WiFi Voice over Internet Protocol Apple Networking Employer-Employee Relationship App BYOD Mobile Device Management Conferencing How To BDR Hacker HIPAA Computing Avoiding Downtime Applications Information Technology Marketing Access Control Office 365 Analytics Office Tips Augmented Reality Retail Storage Big Data Password Healthcare Bring Your Own Device Managed IT Services 2FA Computers Operating System Router Website Virtual Private Network Risk Management Health Help Desk Document Management The Internet of Things Remote Workers Telephone Scam Social Data loss Windows 11 Cooperation Free Resource Project Management Windows 7 Excel Customer Service Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Physical Security Display Printer Paperless Office Infrastructure Firewall Monitoring Outlook Video Conferencing Machine Learning Managed Services Provider Safety Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Customer Relationship Management Supply Chain Images 101 Telephone System Multi-Factor Authentication Robot Mobility Hacking Cost Management Settings Presentation Printing Wireless Content Filtering Wireless Technology IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Processor Data Privacy Computer Repair Mobile Security Word Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology SharePoint Vendors Addiction Entrepreneur Electronic Medical Records Language Employer/Employee Relationships Be Proactive Halloween Chatbots Navigation Management PCI DSS Lenovo Gig Economy Workforce Screen Reader Writing Distributed Denial of Service Threats Undo Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hacks Server Management Regulations Compliance Workplace Strategies Scary Stories Private Cloud Identity Evernote Superfish Bookmark Meta Identity Theft Smart Tech Memes Fun Twitter Alerts SQL Server Amazon Deep Learning Download Net Neutrality Financial Data Error History Browsers Smartwatch Outsource IT Application Education Connectivity IT Social Engineering Break Fix Remote Computing Azure Environment Upload Procurement Media IBM Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech CES Small Businesses Tablet IoT Communitications Search Dark Web Alert Displays Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Legal Data Analysis Outsourcing IT solutions Star Wars IT Assessment How To Microsoft Excel Notifications Staff Value Competition Business Growth Gamification Flexibility Organization Workplace Travel Social Networking Legislation Techology Fileless Malware Digital Security Cameras Hiring/Firing Google Maps Smart Devices Cortana Wearable Technology Memory Alt Codes Content Remote Working Paperless Health IT Co-managed IT User Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Unified Threat Management Directions Videos Technology Care Hosted Solution Assessment Electronic Health Records Permissions Wasting Time Typing Business Communications IP Address Scams Trend Micro Network Congestion Specifications Security Cameras Google Drive User Error Microchip Hybrid Work Internet Exlporer Software as a Service Knowledge Fraud Human Resources Managing Costs Username Cables Recovery Point of Sale eCommerce 5G Black Friday SSID Google Docs Hard Drives Unified Communications Database Surveillance Experience Virtual Assistant Google Apps Running Cable Tech Support IT Technicians Virtual Machine Domains Bitcoin Network Management Google Wallet Proxy Server Reviews IT Maintenance Cookies Monitors Cyber Monday Medical IT Business Intelligence Refrigeration Tactics Development Hotspot Transportation Shortcuts Laptop Websites Mirgation Hypervisor Public Speaking Windows 8 Lithium-ion battery Drones Shopping Ransmoware Nanotechnology Optimization PowerPoint

Blog Archive