Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Artificial Intelligence Automation Facebook Information Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Business Technology Windows 10 Virtualization Blockchain Wi-Fi Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Managed Services Voice over Internet Protocol Chrome Budget Mobile Device Management Tip of the week Gmail Apple App Networking Employer-Employee Relationship Applications Hacker Office 365 Avoiding Downtime Marketing Access Control Conferencing WiFi How To BDR Computing HIPAA Information Technology Router Computers Analytics Office Tips Healthcare Virtual Private Network Website Augmented Reality Help Desk Health Storage Password 2FA Bring Your Own Device Retail Big Data Managed IT Services Operating System Risk Management Customer Service Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Physical Security Display Printer Monitoring Paperless Office Infrastructure Free Resource Windows 11 Project Management Windows 7 Firewall Document Management Microsoft 365 Telephone Excel The Internet of Things Solutions Cooperation Going Green Scam Data loss Social Cybercrime Patch Management Save Money Video Conferencing Managed Services Provider Hacking Virtual Machines Virtual Desktop Presentation Professional Services Data storage LiFi User Tip IT Management Modem Meetings Mobile Security Processor VPN Wireless Technology Outlook iPhone Computer Repair Money Smart Technology Humor Vulnerabilities Word Saving Time Sports Images 101 Mouse Managed IT Service Supply Chain Machine Learning Multi-Factor Authentication Mobility Administration Downloads Safety Licensing Maintenance Entertainment Antivirus Employees Integration Settings Wireless Printing Content Filtering Telephone System Cost Management Holidays YouTube Data Privacy Customer Relationship Management Data Storage Robot Cryptocurrency Unified Communications Employer/Employee Relationships Experience Shortcuts Specifications Google Docs Internet Exlporer Unified Threat Management Fraud PCI DSS Bitcoin Running Cable Navigation Microchip Ransmoware Vendors Unified Threat Management Username Gig Economy Google Wallet Black Friday Internet Service Provider Teamwork User Be Proactive Database Regulations Compliance Network Congestion Windows 8 Laptop Evernote Workforce Threats User Error IT Technicians Drones Memes Cyber Monday Net Neutrality IP Address SQL Server Proxy Server Workplace Strategies Cookies Tactics Point of Sale Hotspot Financial Data History Halloween Meta Amazon Mirgation Smartwatch IT Procurement Azure Recovery Network Management Nanotechnology Tech Support Addiction Language Telework Monitors Hacks Cyber security Scary Stories Hard Drives Tech Outsource IT Domains Environment Fun Management Media Chatbots CES Communitications Distributed Denial of Service Supply Chain Management Deep Learning Screen Reader Websites Service Level Agreement Computing Infrastructure FinTech Refrigeration Term Small Businesses Education Public Speaking Displays SharePoint Identity Electronic Medical Records IT Assessment Flexibility Lithium-ion battery Value Bookmark Smart Tech Entrepreneur Download Alerts Organization Writing Mobile Computing Outsourcing Lenovo Search Digital Security Cameras Virtual Reality Smart Devices Break Fix Remote Working Best Practice Memory Browsers Workplace Server Management Connectivity Private Cloud Upload Identity Theft Data Breach Buisness Undo Google Play Hiring/Firing Superfish IT solutions Social Network Paperless Videos Twitter Multi-Factor Security Legal Electronic Health Records Dark Web Business Growth Wasting Time Co-managed IT IoT Error Trends Social Engineering Trend Micro Security Cameras Technology Care Cortana Customer Resource management Business Communications Regulations Remote Computing Google Calendar Software as a Service Microsoft Excel Alt Codes Managing Costs Application Data Analysis Scams Star Wars Gamification Tablet Staff eCommerce Downtime SSID Hybrid Work Hosted Solution IBM Virtual Assistant Human Resources Social Networking Alert Legislation Surveillance Dark Data Typing Virtual Machine Fileless Malware Cables Managed IT File Sharing Content Wearable Technology Reviews How To Medical IT Transportation Knowledge Health IT Google Apps Motherboard Notifications Comparison Google Drive Development Travel Permissions Hypervisor Directions IT Maintenance Assessment Business Intelligence Techology 5G Google Maps Shopping Optimization Competition PowerPoint

Blog Archive