Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Hosted Solutions Workplace Strategy Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Information Miscellaneous Holiday Artificial Intelligence Automation Cloud Computing Covid-19 Training Gadgets Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Wi-Fi Blockchain Virtualization Business Technology Bandwidth Data Security Two-factor Authentication Vendor Apps Mobile Office Mobile Device Management Gmail WiFi BYOD Employer-Employee Relationship Chrome Tip of the week Budget Managed Services Voice over Internet Protocol Apple App Networking How To BDR Computing Information Technology HIPAA Applications Office 365 Access Control Hacker Avoiding Downtime Conferencing Marketing Operating System Risk Management Big Data Router Virtual Private Network Analytics Office Tips Health Augmented Reality 2FA Help Desk Computers Storage Password Bring Your Own Device Retail Website Healthcare Managed IT Services Going Green Firewall Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Cybercrime Remote Monitoring End of Support Microsoft 365 Vulnerability The Internet of Things Vendor Management Solutions Physical Security Social Display Printer Paperless Office Infrastructure Windows 11 Customer Service Monitoring Document Management Excel Remote Workers Scam Data loss Telephone Entertainment Vulnerabilities Settings Data Privacy Wireless Printing Robot Images 101 Content Filtering Multi-Factor Authentication Mobility Safety YouTube Telephone System Cost Management Cryptocurrency IT Management VPN Meetings Virtual Desktop Employees LiFi Integration Data storage Computer Repair User Tip Modem Processor Mobile Security Outlook Customer Relationship Management Holidays Money Humor Data Storage Smart Technology Supply Chain Hacking Machine Learning Presentation Video Conferencing Managed Services Provider Sports Saving Time Virtual Machines Professional Services Mouse Wireless Technology Maintenance Managed IT Service Antivirus Administration Downloads iPhone Word Licensing Cyber security Multi-Factor Security Tech Human Resources Alert Social Network Telework Dark Data CES Cortana IoT Communitications Dark Web Cables Managed IT Refrigeration File Sharing Public Speaking Alt Codes How To Trends Supply Chain Management Regulations Google Calendar Term Google Apps Lithium-ion battery Notifications Downtime Customer Resource management FinTech Hosted Solution Entrepreneur Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Travel Google Maps Typing Gamification Flexibility Staff Value Business Intelligence Techology Social Networking Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Knowledge Smart Devices Ransmoware Google Drive Undo Unified Threat Management Content Remote Working Wearable Technology Memory Vendors Unified Threat Management 5G Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Communications Network Congestion Directions Videos Experience Assessment Electronic Health Records Permissions Workforce Google Docs User Error Bitcoin Running Cable Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Google Wallet Application Point of Sale Microchip Internet Exlporer Software as a Service Fraud Meta IBM Windows 8 Laptop Username Managing Costs Amazon eCommerce Black Friday SSID Network Management Drones Tech Support Monitors Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Halloween Proxy Server Reviews Cookies Cyber Monday Medical IT Websites Competition Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays SharePoint Hacks Electronic Medical Records Scary Stories Shopping Fun Nanotechnology Optimization PowerPoint Deep Learning Writing Addiction Language Employer/Employee Relationships Outsourcing Lenovo Chatbots Navigation User Virtual Reality Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Server Management Private Cloud Education Identity Theft Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Superfish Identity Evernote Paperless IP Address Mobile Computing Twitter Regulations Compliance Bookmark Search Smart Tech Memes Co-managed IT Error Best Practice Social Engineering Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Recovery Remote Computing Buisness Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Legal Hard Drives IT solutions Domains Tablet Business Growth Upload Procurement Azure Hybrid Work

Blog Archive