Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Passwords Managed Service Saving Money Communication Cybersecurity Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Two-factor Authentication Vendor Mobile Office Data Security Apps Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking Managed Services Voice over Internet Protocol WiFi App Employer-Employee Relationship BYOD Hacker Access Control HIPAA Avoiding Downtime Office 365 Applications Marketing Conferencing How To BDR Computing Information Technology Computers Health Router Office Tips Analytics Website Augmented Reality Retail Storage 2FA Password Help Desk Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Virtual Private Network Risk Management Printer Solutions Paperless Office Infrastructure Document Management Windows 11 Firewall Monitoring Scam Excel Data loss The Internet of Things Remote Workers Telephone Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Cooperation Free Resource Vendor Management Cybercrime Project Management Windows 7 Physical Security Customer Service Microsoft 365 Display Presentation Computer Repair Virtual Desktop Data storage LiFi Wireless Technology Employees Integration Outlook Machine Learning User Tip Modem Money Mobile Security Processor Word Humor Holidays Data Storage Maintenance Antivirus Smart Technology Supply Chain Sports Video Conferencing Mouse Managed Services Provider Virtual Machines Safety Professional Services Saving Time Administration Managed IT Service Downloads iPhone Robot Licensing Settings Printing Vulnerabilities Wireless Entertainment Data Privacy Content Filtering Customer Relationship Management IT Management VPN YouTube Meetings Images 101 Mobility Telephone System Multi-Factor Authentication Cryptocurrency Cost Management Hacking Content Remote Working Google Docs Wearable Technology Memory Vendors Unified Communications Experience Bitcoin Network Management Comparison Google Play Be Proactive Running Cable Tech Support User Health IT Motherboard Data Breach Assessment Electronic Health Records Google Wallet Permissions Workforce Monitors Directions Videos Wasting Time Threats Windows 8 IP Address Specifications Security Cameras Workplace Strategies Laptop Websites Trend Micro Internet Exlporer Software as a Service Drones Fraud Meta Microchip Electronic Medical Records Username SharePoint Managing Costs Amazon Black Friday SSID Halloween Recovery eCommerce Database Surveillance Lenovo Virtual Assistant Outsource IT Hard Drives Writing Virtual Reality IT Technicians Virtual Machine Environment Domains Media Hacks Server Management Cyber Monday Medical IT Scary Stories Private Cloud Proxy Server Reviews Cookies Tactics Development Superfish Hotspot Transportation Small Businesses Identity Theft Refrigeration Fun Twitter Mirgation Hypervisor Displays Deep Learning Public Speaking Nanotechnology Optimization Lithium-ion battery PowerPoint Error Shopping Addiction Language Employer/Employee Relationships Outsourcing Education Social Engineering Entrepreneur Navigation Remote Computing Management PCI DSS Chatbots Screen Reader Mobile Computing Distributed Denial of Service Workplace Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Tablet Undo Search Evernote Paperless Alert Regulations Compliance Identity Best Practice Smart Tech Memes Managed IT Co-managed IT Buisness File Sharing Dark Data Bookmark Download Net Neutrality Legal Alerts SQL Server Technology Care IT solutions How To Business Communications Notifications Financial Data History Business Growth Connectivity IT Break Fix Scams Travel Application Browsers Smartwatch Upload Procurement Techology Azure Hybrid Work Google Maps Cortana IBM Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Alt Codes IoT Communitications Dark Web Cables Downtime Unified Threat Management CES Trends Supply Chain Management Unified Threat Management Hosted Solution Google Calendar Term Google Apps Customer Resource management FinTech Regulations Typing Star Wars IT Assessment Microsoft Excel IT Maintenance Network Congestion Data Analysis Gamification Flexibility Google Drive User Error Staff Value Business Intelligence Competition Knowledge Legislation Shortcuts Organization Social Networking Smart Devices Ransmoware Point of Sale 5G Fileless Malware Digital Security Cameras

Blog Archive