Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy Workplace Tips IT Services Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Users Backup Ransomware Small Business Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Covid-19 Training Gadgets Cloud Computing Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Business Technology Virtualization Wi-Fi Blockchain Vendor Apps Data Security Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget Tip of the week WiFi Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking BYOD HIPAA Office 365 Applications Access Control Conferencing How To Computing BDR Hacker Information Technology Avoiding Downtime Marketing Physical Security Office Tips Router Analytics Virtual Private Network Augmented Reality Health Storage Password 2FA Help Desk Bring Your Own Device Big Data Retail Healthcare Managed IT Services Operating System Computers Risk Management Website Solutions Display Printer Firewall Paperless Office Infrastructure Windows 11 Monitoring The Internet of Things Document Management Excel Social Remote Workers Going Green Scam Telephone Data loss Customer Service Cybercrime Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management VPN Meetings Word Employees Outlook Integration Computer Repair Money User Tip Humor Modem Mobile Security Processor Holidays Safety Sports Data Storage Mouse Supply Chain Smart Technology Machine Learning Video Conferencing Managed Services Provider Administration Professional Services Saving Time Virtual Machines Maintenance Managed IT Service Antivirus Customer Relationship Management Downloads iPhone Settings Printing Licensing Wireless Content Filtering Vulnerabilities Hacking Entertainment Data Privacy YouTube Presentation Cryptocurrency Images 101 Robot Wireless Technology Telephone System Multi-Factor Authentication Mobility Cost Management Virtual Desktop IT Management Data storage LiFi Assessment Electronic Health Records Windows 8 Workforce Permissions Laptop Hard Drives Directions Videos Network Congestion Drones Threats Wasting Time User Error Domains Workplace Strategies Specifications Security Cameras Trend Micro Internet Exlporer Software as a Service Meta Fraud Halloween Refrigeration Point of Sale Microchip Username Amazon Managing Costs Public Speaking Black Friday SSID Network Management Tech Support eCommerce Lithium-ion battery Database Surveillance Hacks Outsource IT Virtual Assistant Scary Stories Entrepreneur Monitors Environment IT Technicians Virtual Machine Media Fun Cyber Monday Medical IT Websites Proxy Server Reviews Cookies Deep Learning Tactics Development Small Businesses Hotspot Transportation Undo Electronic Medical Records Displays Mirgation Hypervisor Education SharePoint PowerPoint Shopping Nanotechnology Optimization Addiction Mobile Computing Outsourcing Language Employer/Employee Relationships Lenovo Writing Virtual Reality Management PCI DSS Chatbots Navigation Search Workplace Distributed Denial of Service Server Management Application Private Cloud Gig Economy Screen Reader Best Practice Service Level Agreement Internet Service Provider Hiring/Firing Computing Infrastructure Teamwork Buisness Superfish Identity Theft Twitter Regulations Compliance Legal Identity IT solutions IBM Evernote Paperless Co-managed IT Error Bookmark Smart Tech Memes Business Growth Download Net Neutrality Technology Care Alerts SQL Server Social Engineering Remote Computing Financial Data History Business Communications Cortana Alt Codes Scams Break Fix Browsers Smartwatch Connectivity IT Upload Procurement Hybrid Work Azure Downtime Competition Tablet Alert Social Network Telework Cyber security Hosted Solution Multi-Factor Security Tech Human Resources Typing Cables Dark Web Managed IT File Sharing CES Dark Data IoT Communitications How To Trends Supply Chain Management Knowledge User Notifications Customer Resource management FinTech Google Drive Regulations Google Calendar Term Google Apps IT Maintenance Microsoft Excel Travel Data Analysis Star Wars IT Assessment Gamification Flexibility Business Intelligence Staff Value Techology 5G Google Maps Experience Organization Google Docs Social Networking Unified Communications IP Address Legislation Shortcuts Smart Devices Bitcoin Ransmoware Running Cable Unified Threat Management Fileless Malware Digital Security Cameras Content Remote Working Google Wallet Vendors Wearable Technology Memory Unified Threat Management Be Proactive Comparison Google Play Recovery Health IT Motherboard Data Breach

Blog Archive