Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Data Backup Managed Service Smartphone Android Upgrade AI VoIP Business Management Smartphones Mobile Devices Data Recovery communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Automation Information Facebook Covid-19 Cloud Computing Miscellaneous Holiday Gadgets Training Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Blockchain Windows 10 Wi-Fi Virtualization Mobile Office Vendor Data Security Two-factor Authentication Apps Chrome Budget Tip of the week Apple App Mobile Device Management Networking Gmail BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Access Control Hacker Avoiding Downtime Marketing HIPAA How To Applications BDR Computing WiFi Information Technology Conferencing Office 365 Augmented Reality Health Storage Computers Password Bring Your Own Device Retail Website Router Managed IT Services 2FA Operating System Risk Management Help Desk Big Data Virtual Private Network Healthcare Analytics Office Tips Paperless Office Infrastructure Free Resource Customer Service Project Management Cooperation Windows 7 Document Management Microsoft 365 Solutions Scam Data loss Going Green Windows 11 Firewall Cybercrime Excel Patch Management Save Money Monitoring Remote Monitoring The Internet of Things Vulnerability End of Support Vendor Management Social Remote Workers Physical Security Display Printer Telephone Money Humor Licensing Vulnerabilities Entertainment Hacking Images 101 Presentation Machine Learning Sports Multi-Factor Authentication Mobility Mouse Wireless Technology Telephone System Administration Cost Management Maintenance Antivirus Employees Word Integration Settings Wireless Modem Printing User Tip Supply Chain Processor Content Filtering Holidays Mobile Security Safety Robot YouTube Data Storage Cryptocurrency Video Conferencing Managed Services Provider Smart Technology Virtual Machines Professional Services IT Management Saving Time VPN Meetings Virtual Desktop LiFi Data storage Managed IT Service Data Privacy iPhone Computer Repair Outlook Downloads Customer Relationship Management Browsers Telework IT Maintenance Connectivity Cyber security Break Fix Tech Monitors CES Business Intelligence Upload Communitications Competition Websites Multi-Factor Security Hacks Scary Stories Social Network Supply Chain Management Shortcuts FinTech Ransmoware Fun IoT Dark Web Term Deep Learning Vendors SharePoint Trends IT Assessment Electronic Medical Records Regulations Value User Google Calendar Customer Resource management Flexibility Be Proactive Education Data Analysis Organization Workforce Lenovo Star Wars Microsoft Excel Writing Digital Security Cameras Threats Gamification Smart Devices Staff Virtual Reality IP Address Social Networking Memory Private Cloud Legislation Mobile Computing Remote Working Workplace Strategies Server Management Fileless Malware Meta Superfish Search Data Breach Identity Theft Google Play Best Practice Videos Amazon Content Electronic Health Records Wearable Technology Twitter Motherboard Wasting Time Error Recovery Comparison Buisness Health IT IT solutions Directions Outsource IT Assessment Trend Micro Hard Drives Permissions Security Cameras Social Engineering Legal Business Growth Environment Software as a Service Media Domains Remote Computing Managing Costs Specifications Microchip Small Businesses Cortana Internet Exlporer eCommerce Tablet Refrigeration Fraud SSID Alt Codes Displays Username Surveillance Public Speaking Virtual Assistant Alert Lithium-ion battery Virtual Machine File Sharing Black Friday Dark Data Downtime Managed IT Hosted Solution Reviews Outsourcing Database Medical IT How To Entrepreneur Typing Development IT Technicians Transportation Notifications Workplace Cookies Hypervisor Travel Cyber Monday Proxy Server Shopping Hiring/Firing Techology Knowledge Tactics Optimization Google Maps Undo Hotspot PowerPoint Google Drive Paperless Mirgation Employer/Employee Relationships PCI DSS Co-managed IT 5G Nanotechnology Unified Threat Management Navigation Unified Communications Gig Economy Technology Care Unified Threat Management Experience Addiction Language Google Docs Teamwork Bitcoin Running Cable Management Internet Service Provider Business Communications Chatbots Regulations Compliance Scams Screen Reader Application Distributed Denial of Service Evernote Network Congestion Google Wallet Hybrid Work User Error Service Level Agreement Memes Computing Infrastructure Identity SQL Server Windows 8 Laptop Net Neutrality Human Resources IBM Bookmark Financial Data Cables Smart Tech History Point of Sale Drones Smartwatch Download IT Alerts Azure Tech Support Halloween Procurement Google Apps Network Management

Blog Archive