Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Automation Facebook Miscellaneous Holiday Training Compliance Gadgets Cloud Computing Covid-19 Managed Service Provider Outsourced IT Server Remote Work IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Managed Services Apps Data Security Vendor Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Tip of the week Budget WiFi Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Office 365 Access Control Conferencing Managed IT Services How To BDR Computing Hacker Information Technology HIPAA Avoiding Downtime Physical Security Applications Marketing Analytics Office Tips Health 2FA Augmented Reality Help Desk Storage Password Bring Your Own Device Retail Healthcare Big Data Operating System Computers Risk Management Router Website Virtual Private Network Printer Paperless Office Windows 11 Infrastructure Firewall Monitoring Excel Document Management The Internet of Things Remote Workers Managed IT Service Telephone Scam Social Data loss Going Green Cooperation Free Resource Project Management Windows 7 Patch Management Customer Service Save Money Microsoft 365 Cybercrime Remote Monitoring End of Support Vulnerability Vendor Management Solutions Display Processor Computer Repair Mobile Security Word Outlook Holidays Data Storage Money Humor Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Safety Virtual Machines Professional Services Sports Mouse Maintenance Administration Downloads Antivirus iPhone Licensing Entertainment Vulnerabilities Data Privacy Customer Relationship Management Images 101 Settings Wireless Printing Multi-Factor Authentication Robot Mobility Content Filtering Telephone System Cost Management Hacking YouTube Presentation Cryptocurrency IT Management Wireless Technology Meetings VPN Employees Integration Virtual Desktop User Tip Data storage Modem LiFi Database Surveillance Hard Drives Windows 8 Virtual Assistant Outsource IT Laptop Tech Support IT Technicians Virtual Machine Environment Media Network Management Domains Drones Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development Refrigeration Hotspot Transportation Small Businesses Halloween Websites Mirgation Hypervisor Displays Public Speaking Shopping Lithium-ion battery Nanotechnology Optimization PowerPoint SharePoint Addiction Hacks Electronic Medical Records Language Employer/Employee Relationships Outsourcing Entrepreneur Scary Stories Chatbots Navigation Fun Management PCI DSS Lenovo Gig Economy Screen Reader Deep Learning Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Undo Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Education Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Download Net Neutrality Mobile Computing Twitter Alerts SQL Server Technology Care Error History Business Communications Search Financial Data Browsers Smartwatch Connectivity IT Application Best Practice Social Engineering Break Fix Scams Upload Procurement Remote Computing Azure Hybrid Work Buisness Cyber security IT solutions Multi-Factor Security Tech Human Resources Social Network Telework IBM Legal CES Tablet IoT Communitications Business Growth Dark Web Cables Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Cortana Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment Alt Codes How To Microsoft Excel IT Maintenance Gamification Flexibility Competition Notifications Staff Value Business Intelligence Downtime Travel Social Networking Hosted Solution Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Typing Ransmoware Content Remote Working Wearable Technology Memory Vendors Google Drive Unified Threat Management Motherboard Data Breach User Comparison Google Play Be Proactive Knowledge Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce 5G Wasting Time Threats IP Address Google Docs Trend Micro Unified Communications Network Congestion Specifications Security Cameras Workplace Strategies Experience User Error Microchip Internet Exlporer Software as a Service Bitcoin Fraud Meta Running Cable Username Google Wallet Managing Costs Amazon Point of Sale eCommerce Recovery Black Friday SSID

Blog Archive