Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Saving Money Communication Productivity Cybersecurity Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management AI Smartphones communications Data Recovery Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Information Automation Facebook Artificial Intelligence Holiday Training Miscellaneous Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Data Management Government Blockchain Business Technology Windows 10 Wi-Fi Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Data Security Apps Managed Services Voice over Internet Protocol Apple Mobile Device Management Tip of the week App Gmail Networking Employer-Employee Relationship Chrome BYOD Budget Avoiding Downtime Marketing Access Control HIPAA Applications WiFi Computing Information Technology How To Conferencing BDR Office 365 Hacker Storage Virtual Private Network Password Website Bring Your Own Device Healthcare Health Router 2FA Retail Operating System Help Desk Big Data Risk Management Managed IT Services Analytics Office Tips Computers Augmented Reality Display Printer Remote Workers Paperless Office Infrastructure Firewall Going Green Document Management Free Resource Windows 11 Project Management Windows 7 The Internet of Things Cybercrime Microsoft 365 Excel Scam Monitoring Data loss Solutions Social Patch Management Telephone Save Money Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Cooperation Physical Security Virtual Machines Professional Services Sports Telephone System Mouse Computer Repair Cost Management Word Administration iPhone Machine Learning Vulnerabilities User Tip Modem Processor Images 101 Safety Mobile Security Settings Wireless Printing Supply Chain Multi-Factor Authentication Content Filtering Mobility Maintenance Antivirus YouTube Smart Technology Cryptocurrency Saving Time Employees Integration Virtual Desktop LiFi Managed IT Service Data storage Customer Relationship Management Robot Downloads Holidays Data Privacy Outlook Hacking Licensing Money Data Storage Presentation Entertainment Humor IT Management VPN Meetings Video Conferencing Wireless Technology Managed Services Provider Gig Economy IP Address Star Wars Deep Learning Vendors Microsoft Excel Data Analysis Gamification Point of Sale Internet Service Provider Staff Teamwork Be Proactive Workforce Legislation Evernote Regulations Compliance Social Networking Education Tech Support Memes Threats Recovery Fileless Malware Network Management Content Mobile Computing Net Neutrality Hard Drives Wearable Technology Monitors SQL Server Workplace Strategies History Meta Comparison Search Health IT Financial Data Domains Motherboard Smartwatch Assessment Best Practice Websites IT Amazon Permissions Directions Procurement Refrigeration Buisness Azure Cyber security Outsource IT Specifications Tech SharePoint Legal Telework Public Speaking IT solutions Electronic Medical Records CES Lithium-ion battery Internet Exlporer Business Growth Communitications Environment Fraud Media Microchip Lenovo Username Supply Chain Management Writing Entrepreneur Virtual Reality Small Businesses Black Friday Cortana Term FinTech Server Management Database Alt Codes Private Cloud IT Assessment Displays Superfish Identity Theft Flexibility Undo IT Technicians Downtime Value Cookies Hosted Solution Twitter Outsourcing Cyber Monday Proxy Server Organization Digital Security Cameras Tactics Typing Error Smart Devices Hotspot Remote Working Mirgation Social Engineering Memory Workplace Nanotechnology Remote Computing Data Breach Hiring/Firing Knowledge Google Play Google Drive Videos Addiction Electronic Health Records Application Language Paperless 5G Management Tablet Chatbots Wasting Time Co-managed IT Screen Reader Unified Communications Alert Trend Micro Technology Care Distributed Denial of Service Experience Security Cameras Google Docs IBM Managed IT Service Level Agreement Bitcoin File Sharing Software as a Service Computing Infrastructure Running Cable Dark Data Business Communications Google Wallet Identity How To Managing Costs Scams Smart Tech Notifications eCommerce Hybrid Work SSID Bookmark Download Windows 8 Travel Surveillance Alerts Laptop Virtual Assistant Human Resources Techology Drones Google Maps Competition Virtual Machine Cables Connectivity Break Fix Medical IT Browsers Reviews Upload Unified Threat Management Development Halloween Transportation Google Apps Multi-Factor Security Unified Threat Management Social Network Hypervisor IT Maintenance IoT Optimization Business Intelligence User Dark Web PowerPoint Shopping Trends Hacks Scary Stories Network Congestion Employer/Employee Relationships Shortcuts Ransmoware Google Calendar Fun Navigation User Error Customer Resource management PCI DSS Regulations

Blog Archive