Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP AI Business Management Smartphones communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Information Artificial Intelligence Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Government Data Management Business Continuity Windows 10 Virtualization Wi-Fi Blockchain Business Technology Bandwidth Apps Two-factor Authentication Vendor Mobile Office Data Security Gmail BYOD App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Chrome Networking Budget Mobile Device Management Apple WiFi Computing Access Control Information Technology HIPAA Applications Office 365 Hacker Avoiding Downtime How To Marketing BDR Conferencing 2FA Virtual Private Network Operating System Big Data Health Risk Management Router Retail Analytics Office Tips Computers Healthcare Augmented Reality Help Desk Managed IT Services Website Storage Password Bring Your Own Device Remote Monitoring Firewall Vulnerability Telephone End of Support Solutions Windows 11 Vendor Management Going Green Physical Security Cooperation The Internet of Things Excel Display Printer Cybercrime Paperless Office Social Infrastructure Document Management Customer Service Remote Workers Scam Data loss Monitoring Free Resource Project Management Windows 7 Patch Management Microsoft 365 Save Money Downloads Licensing IT Management VPN Meetings Employees Safety Integration Supply Chain Entertainment Settings Printing Wireless Content Filtering Computer Repair Telephone System YouTube Holidays Cost Management Cryptocurrency Data Storage Video Conferencing Machine Learning Managed Services Provider Customer Relationship Management Professional Services Virtual Desktop Virtual Machines LiFi Data storage Data Privacy Hacking User Tip Modem Mobile Security Presentation Maintenance Outlook Processor Antivirus iPhone Money Wireless Technology Humor Vulnerabilities Smart Technology Sports Mouse Images 101 Saving Time Word Robot Multi-Factor Authentication Mobility Managed IT Service Administration Best Practice Remote Working Download Memory Alerts Public Speaking Outsource IT Environment Unified Threat Management Media Buisness Data Breach Lithium-ion battery Google Play Break Fix Unified Threat Management Entrepreneur Legal Videos Browsers IT solutions Electronic Health Records Connectivity Business Growth Upload Wasting Time Small Businesses Displays Social Network Network Congestion Trend Micro Security Cameras Multi-Factor Security Cortana Dark Web User Error Undo Software as a Service IoT Alt Codes Trends Managing Costs Outsourcing Point of Sale Customer Resource management Downtime eCommerce Regulations SSID Google Calendar Star Wars Virtual Assistant Microsoft Excel Workplace Data Analysis Hosted Solution Surveillance Tech Support Typing Gamification Virtual Machine Staff Network Management Hiring/Firing Legislation Application Paperless Reviews Monitors Social Networking Medical IT Development Knowledge Transportation Co-managed IT Google Drive Fileless Malware Websites Content Hypervisor Wearable Technology IBM Technology Care PowerPoint Comparison Business Communications Shopping Health IT Optimization Motherboard 5G Unified Communications Assessment Experience Employer/Employee Relationships Permissions SharePoint Scams Google Docs Directions Electronic Medical Records Hybrid Work Bitcoin PCI DSS Running Cable Navigation Specifications Lenovo Human Resources Google Wallet Gig Economy Writing Internet Service Provider Internet Exlporer Teamwork Fraud Competition Cables Microchip Virtual Reality Private Cloud Windows 8 Regulations Compliance Username Laptop Evernote Server Management Black Friday Superfish Identity Theft Google Apps Drones Memes Net Neutrality Database SQL Server IT Maintenance Twitter Business Intelligence Error Financial Data Halloween History IT Technicians User Cyber Monday Shortcuts Smartwatch Proxy Server Social Engineering IT Cookies Procurement Tactics Azure Hotspot Ransmoware Remote Computing Vendors Hacks Telework Scary Stories Cyber security Mirgation IP Address Tech Fun Tablet Be Proactive CES Communitications Nanotechnology Deep Learning Supply Chain Management Addiction Language Workforce Alert Threats File Sharing FinTech Management Dark Data Chatbots Term Managed IT Recovery Distributed Denial of Service Hard Drives Workplace Strategies How To Education IT Assessment Screen Reader Flexibility Service Level Agreement Value Computing Infrastructure Domains Meta Notifications Amazon Travel Mobile Computing Organization Identity Search Techology Refrigeration Google Maps Digital Security Cameras Bookmark Smart Devices Smart Tech

Blog Archive