Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Productivity Cybersecurity Smartphone Managed Service Data Backup Android Upgrade VoIP Business Management AI Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Information Facebook Artificial Intelligence Automation Miscellaneous Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Data Management Government Business Continuity Blockchain Windows 10 Virtualization Wi-Fi Bandwidth Business Technology Vendor Data Security Apps Two-factor Authentication Mobile Office Gmail Apple App Networking Employer-Employee Relationship BYOD Chrome Managed Services Voice over Internet Protocol Budget Mobile Device Management Tip of the week HIPAA WiFi Applications How To BDR Computing Information Technology Conferencing Hacker Office 365 Avoiding Downtime Access Control Marketing Bring Your Own Device Retail Router Managed IT Services Big Data Operating System Help Desk Risk Management Computers Virtual Private Network 2FA Analytics Office Tips Website Augmented Reality Health Healthcare Storage Password Firewall Document Management Free Resource Project Management Windows 7 The Internet of Things Scam Data loss Microsoft 365 Going Green Social Solutions Cybercrime Monitoring Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Physical Security Windows 11 Telephone Display Printer Paperless Office Excel Infrastructure Remote Workers Cooperation Telephone System Mouse Vulnerabilities Cost Management Administration Maintenance Safety Images 101 Antivirus Data Privacy Multi-Factor Authentication Mobility User Tip Modem Mobile Security Settings Processor Wireless Printing Content Filtering Employees Integration Robot YouTube Smart Technology Customer Relationship Management Cryptocurrency Saving Time Holidays IT Management Hacking Virtual Desktop Presentation Data Storage VPN Meetings Data storage Managed IT Service LiFi Video Conferencing Wireless Technology Managed Services Provider Downloads Outlook Professional Services Computer Repair Virtual Machines Supply Chain Licensing Money Humor Entertainment Word iPhone Machine Learning Sports Writing Education Public Speaking Telework Technology Care Lenovo Social Networking Cyber security Legislation Tech Business Communications Virtual Reality Lithium-ion battery Fileless Malware CES Communitications Content Supply Chain Management Entrepreneur Scams Server Management Wearable Technology Private Cloud Mobile Computing Search Health IT FinTech Hybrid Work Superfish Motherboard Identity Theft Comparison Term Human Resources Permissions Twitter Best Practice Directions Assessment IT Assessment Undo Flexibility Cables Value Error Buisness Social Engineering IT solutions Organization Legal Specifications Smart Devices Google Apps Fraud Remote Computing Business Growth Microchip Digital Security Cameras Internet Exlporer Username Remote Working IT Maintenance Memory Google Play Cortana Business Intelligence Data Breach Tablet Black Friday Electronic Health Records Shortcuts Alert Alt Codes Videos Application Database Ransmoware Managed IT IT Technicians Wasting Time File Sharing Dark Data Downtime Security Cameras How To Hosted Solution IBM Proxy Server Vendors Cookies Trend Micro Cyber Monday Tactics Software as a Service Be Proactive Hotspot Notifications Typing Workforce Mirgation Managing Costs Travel SSID Knowledge Threats Techology Nanotechnology eCommerce Google Maps Google Drive Addiction Surveillance Workplace Strategies Language Virtual Assistant Competition 5G Management Meta Chatbots Virtual Machine Unified Threat Management Google Docs Distributed Denial of Service Medical IT Unified Communications Experience Reviews Amazon Unified Threat Management Screen Reader Service Level Agreement Development Computing Infrastructure Transportation Bitcoin Running Cable Outsource IT Identity Hypervisor Google Wallet Network Congestion PowerPoint Bookmark Shopping User Environment User Error Smart Tech Optimization Media Download Alerts Employer/Employee Relationships Windows 8 Laptop PCI DSS Small Businesses Point of Sale Drones Navigation Break Fix IP Address Browsers Gig Economy Displays Connectivity Upload Internet Service Provider Network Management Teamwork Tech Support Halloween Monitors Social Network Regulations Compliance Outsourcing Multi-Factor Security Evernote Dark Web Recovery IoT Memes Trends Net Neutrality Workplace SQL Server Websites Hacks Scary Stories Hard Drives Domains Fun Customer Resource management Financial Data Hiring/Firing Regulations History Google Calendar Paperless Microsoft Excel Electronic Medical Records Deep Learning Data Analysis Smartwatch SharePoint Star Wars IT Gamification Procurement Co-managed IT Staff Azure Refrigeration

Blog Archive