Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Saving Money Quick Tips Passwords Communication Cybersecurity Managed Service Smartphone Data Backup Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Cloud Computing Covid-19 Training Managed Service Provider Compliance Remote Work Server Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Managed Services Voice over Internet Protocol Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Tip of the week Conferencing How To BDR Computing HIPAA Information Technology Applications Hacker Access Control Avoiding Downtime Office 365 Marketing Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Router Virtual Private Network Risk Management Computers Health Office Tips Analytics Website 2FA Help Desk Document Management Excel Firewall Remote Workers Scam Telephone Data loss The Internet of Things Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Social Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Vendor Management Cybercrime Solutions Physical Security Customer Service Display Printer Paperless Office Infrastructure Windows 11 Monitoring Video Conferencing Money Word Humor Managed Services Provider Virtual Machines Professional Services Saving Time Maintenance Antivirus Managed IT Service Sports Mouse Downloads Safety iPhone Licensing Administration Vulnerabilities Entertainment Data Privacy Robot Images 101 Mobility Settings Telephone System Multi-Factor Authentication Cost Management Printing Wireless Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Cryptocurrency Employees Integration Hacking Computer Repair Presentation User Tip Modem Mobile Security Virtual Desktop Processor Data storage LiFi Wireless Technology Holidays Data Storage Outlook Smart Technology Supply Chain Machine Learning Addiction Lenovo Language Employer/Employee Relationships Outsourcing Hard Drives Writing Navigation Virtual Reality Management PCI DSS Chatbots Domains Screen Reader Hacks Server Management Distributed Denial of Service Workplace Scary Stories Private Cloud Gig Economy Service Level Agreement Internet Service Provider Superfish Computing Infrastructure Teamwork Hiring/Firing Identity Theft Refrigeration Fun Evernote Paperless Twitter Regulations Compliance Identity Deep Learning Public Speaking Smart Tech Memes Lithium-ion battery Co-managed IT Error Bookmark Download Net Neutrality Alerts SQL Server Technology Care Education Social Engineering Entrepreneur Business Communications Remote Computing Financial Data History Connectivity IT Mobile Computing Break Fix Scams Browsers Smartwatch Upload Procurement Azure Hybrid Work Tablet Undo Search Multi-Factor Security Tech Human Resources Alert Social Network Telework Cyber security Best Practice IoT Communitications Managed IT Dark Web Cables Buisness File Sharing Dark Data CES Trends Supply Chain Management Legal IT solutions How To Google Calendar Term Google Apps Notifications Customer Resource management FinTech Regulations Business Growth Star Wars IT Assessment Microsoft Excel IT Maintenance Travel Application Data Analysis Gamification Flexibility Techology Staff Value Business Intelligence Google Maps Cortana Alt Codes IBM Legislation Shortcuts Organization Social Networking Smart Devices Ransmoware Downtime Unified Threat Management Fileless Malware Digital Security Cameras Content Remote Working Unified Threat Management Wearable Technology Memory Vendors Hosted Solution Typing Comparison Google Play Be Proactive Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Network Congestion Directions Videos Knowledge Google Drive User Error Wasting Time Threats Competition Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Fraud Meta Point of Sale 5G Microchip Experience Username Google Docs Managing Costs Amazon Unified Communications Bitcoin Network Management Black Friday SSID Running Cable Tech Support User eCommerce Database Surveillance Google Wallet Virtual Assistant Outsource IT Monitors IT Technicians Virtual Machine Environment Media Windows 8 IP Address Cyber Monday Medical IT Laptop Websites Proxy Server Reviews Cookies Tactics Development Drones Hotspot Transportation Small Businesses Electronic Medical Records SharePoint Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Halloween Recovery Shopping

Blog Archive