Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Managed Service Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone AI Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Information Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Windows 10 Virtualization Blockchain Wi-Fi Business Technology Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Managed Services Voice over Internet Protocol Apple Networking WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Conferencing How To BDR Computing Information Technology HIPAA Hacker Applications Access Control Avoiding Downtime Office 365 Marketing Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Physical Security Virtual Private Network Risk Management Computers Router Health Office Tips Website Analytics Augmented Reality 2FA Help Desk Retail Firewall Scam Data loss Remote Workers Telephone The Internet of Things Social Going Green Patch Management Cooperation Free Resource Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Cybercrime Microsoft 365 Solutions Customer Service Display Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Virtual Machines Professional Services Saving Time Maintenance Antivirus Sports Mouse Managed IT Service Safety Downloads Administration iPhone Licensing Vulnerabilities Entertainment Data Privacy Robot Settings Images 101 Printing Wireless Content Filtering Mobility Telephone System Multi-Factor Authentication IT Management Cost Management Customer Relationship Management VPN YouTube Meetings Cryptocurrency Hacking Computer Repair Presentation Employees Integration Virtual Desktop Wireless Technology Data storage User Tip LiFi Modem Mobile Security Processor Outlook Holidays Machine Learning Money Data Storage Smart Technology Supply Chain Word Humor Video Conferencing Managed Services Provider Screen Reader Twitter Distributed Denial of Service Workplace Public Speaking Gig Economy Deep Learning Service Level Agreement Internet Service Provider Error Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Evernote Paperless Entrepreneur Regulations Compliance Education Identity Social Engineering Smart Tech Memes Remote Computing Co-managed IT Bookmark Mobile Computing Download Net Neutrality Alerts SQL Server Technology Care Search Business Communications Undo Financial Data Tablet History Best Practice Connectivity IT Alert Break Fix Scams Browsers Smartwatch Managed IT Upload Procurement Buisness File Sharing Azure Hybrid Work Dark Data How To Multi-Factor Security Tech Human Resources Legal Social Network Telework IT solutions Cyber security Business Growth IoT Communitications Notifications Dark Web Cables CES Trends Supply Chain Management Travel Application Cortana Google Calendar Term Google Apps Techology Customer Resource management FinTech Google Maps Regulations Alt Codes Star Wars IT Assessment Microsoft Excel IT Maintenance IBM Data Analysis Gamification Flexibility Downtime Unified Threat Management Staff Value Business Intelligence Legislation Shortcuts Unified Threat Management Organization Hosted Solution Social Networking Typing Smart Devices Ransmoware Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Network Congestion Knowledge Comparison Google Play Be Proactive Competition Google Drive User Error Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Directions Videos Point of Sale Wasting Time Threats 5G Experience Specifications Security Cameras Workplace Strategies Google Docs Unified Communications Trend Micro Bitcoin Network Management Internet Exlporer Software as a Service Running Cable Tech Support Fraud Meta User Microchip Google Wallet Username Managing Costs Amazon Monitors Black Friday SSID eCommerce Windows 8 Database Surveillance Laptop Websites Virtual Assistant Outsource IT IP Address Drones IT Technicians Virtual Machine Environment Media Electronic Medical Records Cyber Monday Medical IT SharePoint Proxy Server Reviews Cookies Tactics Development Halloween Hotspot Transportation Small Businesses Recovery Hard Drives Lenovo Mirgation Hypervisor Displays Writing Virtual Reality PowerPoint Domains Shopping Nanotechnology Optimization Hacks Server Management Addiction Scary Stories Private Cloud Language Employer/Employee Relationships Outsourcing Refrigeration Superfish Management PCI DSS Identity Theft Chatbots Fun Navigation

Blog Archive