Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Facebook Holiday Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Compliance Remote Work Outsourced IT Server Managed Service Provider IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Wi-Fi Bandwidth Blockchain Windows 10 Vendor Apps Managed Services Two-factor Authentication Mobile Office Data Security Apple BYOD WiFi App Employer-Employee Relationship Tip of the week Voice over Internet Protocol Networking Chrome Mobile Device Management Budget Gmail HIPAA Physical Security Applications Access Control Computing Information Technology Conferencing Hacker Avoiding Downtime Office 365 Managed IT Services Marketing How To BDR Router Big Data Virtual Private Network Health Operating System 2FA Help Desk Risk Management Computers Retail Healthcare Office Tips Analytics Website Augmented Reality Storage Password Bring Your Own Device Vendor Management Solutions The Internet of Things Display Going Green Social Printer Windows 11 Paperless Office Infrastructure Monitoring Cybercrime Excel Document Management Customer Service Managed IT Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Safety IT Management Administration VPN Employees Meetings Integration User Tip Modem Computer Repair Mobile Security Processor Settings Holidays Printing Wireless Content Filtering Data Storage Customer Relationship Management Smart Technology Supply Chain Video Conferencing YouTube Machine Learning Managed Services Provider Virtual Machines Cryptocurrency Professional Services Saving Time Hacking Presentation Maintenance Virtual Desktop Downloads Antivirus Data storage LiFi Wireless Technology iPhone Licensing Outlook Vulnerabilities Entertainment Money Data Privacy Word Humor Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Sports Mouse Assessment Electronic Health Records Mobile Computing Permissions Workforce Unified Threat Management Directions Videos Wasting Time Threats Undo Search Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Best Practice Internet Exlporer Software as a Service Fraud Meta Buisness User Error Microchip Username Legal Managing Costs Amazon IT solutions Business Growth Black Friday SSID Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Application Cortana Network Management Tech Support IT Technicians Virtual Machine Environment Media Alt Codes IBM Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Downtime Websites Mirgation Hypervisor Displays Hosted Solution Typing PowerPoint Shopping Nanotechnology Optimization SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Knowledge Management PCI DSS Google Drive Chatbots Competition Navigation Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing 5G Evernote Paperless Experience Server Management Regulations Compliance Google Docs Private Cloud Identity Unified Communications Identity Theft Smart Tech Memes Bitcoin Co-managed IT Running Cable User Superfish Bookmark Download Net Neutrality Google Wallet Twitter Alerts SQL Server Technology Care Business Communications Financial Data Error History Connectivity IT Windows 8 IP Address Social Engineering Break Fix Scams Laptop Browsers Smartwatch Upload Procurement Drones Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables Halloween Recovery CES Trends Supply Chain Management Alert Hard Drives Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations Domains Star Wars IT Assessment Hacks How To Microsoft Excel IT Maintenance Scary Stories Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Refrigeration Fun Public Speaking Legislation Shortcuts Organization Travel Social Networking Deep Learning Google Maps Smart Devices Lithium-ion battery Ransmoware Techology Fileless Malware Digital Security Cameras Entrepreneur Content Remote Working Wearable Technology Memory Vendors Education Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach

Blog Archive