Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Saving Money Quick Tips Passwords Communication Managed Service Cybersecurity Smartphone Data Backup Android Disaster Recovery AI Upgrade Data Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Information Miscellaneous Artificial Intelligence Holiday Automation Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship IT Support Spam Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Two-factor Authentication Data Security Vendor Apps Mobile Office Gmail Networking Chrome Managed Services Voice over Internet Protocol Employer-Employee Relationship Budget BYOD Apple App Tip of the week Mobile Device Management Computing Information Technology How To WiFi BDR Office 365 HIPAA Applications Hacker Access Control Conferencing Avoiding Downtime Marketing Risk Management Managed IT Services 2FA Big Data Analytics Office Tips Router Augmented Reality Healthcare Storage Password Bring Your Own Device Help Desk Virtual Private Network Computers Health Website Operating System Retail Cooperation Firewall Scam Data loss Windows 11 The Internet of Things Excel Social Patch Management Save Money Remote Monitoring End of Support Vulnerability Remote Workers Vendor Management Physical Security Monitoring Customer Service Display Printer Free Resource Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Going Green Telephone Document Management Solutions Cybercrime YouTube Maintenance Antivirus Cryptocurrency Telephone System Safety Holidays Cost Management Virtual Desktop Data Storage Supply Chain Data storage LiFi Video Conferencing Managed Services Provider Robot Professional Services Outlook Virtual Machines Money Humor User Tip Modem Mobile Security Processor IT Management Customer Relationship Management iPhone VPN Meetings Sports Mouse Hacking Smart Technology Vulnerabilities Presentation Computer Repair Data Privacy Administration Saving Time Images 101 Wireless Technology Mobility Multi-Factor Authentication Managed IT Service Downloads Machine Learning Settings Wireless Licensing Word Printing Content Filtering Employees Integration Entertainment Trends Public Speaking Twitter Managing Costs Amazon Google Calendar SSID Google Drive Customer Resource management Knowledge Lithium-ion battery Regulations Error eCommerce Star Wars Surveillance Microsoft Excel Social Engineering Virtual Assistant Outsource IT Entrepreneur Data Analysis Gamification 5G Staff Remote Computing Virtual Machine Environment Media Legislation Medical IT Google Docs Unified Communications Experience Reviews Social Networking Tablet Development Undo Transportation Small Businesses Bitcoin Fileless Malware Running Cable Content Wearable Technology Alert Hypervisor Displays Google Wallet Comparison Dark Data PowerPoint Health IT Managed IT Shopping Motherboard File Sharing Optimization Assessment Permissions How To Employer/Employee Relationships Outsourcing Windows 8 Directions Laptop PCI DSS Notifications Navigation Drones Application Specifications Workplace Gig Economy Travel Internet Exlporer Google Maps Internet Service Provider Fraud Teamwork Hiring/Firing Microchip Techology Halloween Username Regulations Compliance IBM Evernote Paperless Black Friday Co-managed IT Unified Threat Management Memes Database Net Neutrality SQL Server Technology Care Hacks Unified Threat Management Scary Stories Fun Financial Data IT Technicians History Business Communications Cyber Monday Network Congestion Scams Deep Learning Proxy Server Smartwatch Cookies IT Tactics Procurement Competition Hotspot Azure Hybrid Work User Error Education Telework Mirgation Cyber security Tech Human Resources Communitications Cables CES Nanotechnology Point of Sale Addiction Supply Chain Management Language Mobile Computing Term Google Apps Management Network Management Search FinTech Chatbots Tech Support User IT Assessment Distributed Denial of Service Monitors IT Maintenance Best Practice Screen Reader Buisness Service Level Agreement Flexibility Computing Infrastructure Value Business Intelligence Shortcuts Legal IT solutions Organization IP Address Identity Websites Smart Tech Smart Devices Ransmoware Business Growth Bookmark Digital Security Cameras SharePoint Download Remote Working Alerts Electronic Medical Records Memory Vendors Recovery Google Play Be Proactive Cortana Data Breach Connectivity Electronic Health Records Hard Drives Break Fix Writing Workforce Alt Codes Browsers Lenovo Videos Downtime Upload Domains Virtual Reality Wasting Time Threats Multi-Factor Security Security Cameras Workplace Strategies Hosted Solution Social Network Server Management Private Cloud Trend Micro IoT Identity Theft Software as a Service Refrigeration Dark Web Meta Typing Superfish

Blog Archive