Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Navigating Google Docs' New AI Features

Navigating Google Docs' New AI Features

I was working on a project the other day, and as I started typing out a summary, a little icon popped up in the margin of my Google Doc. It was Google’s AI, essentially asking me if I wanted help "refining" my thoughts.

If you use Google Workspace for your business, you’ve likely seen these "Help me write" prompts appearing. It’s part of the massive AI wave we’re seeing everywhere, but this one is right there in the middle of your workspace.

Continue reading

Wikipedia Fights Back Against the Surge of AI-Generated Lies

Wikipedia Fights Back Against the Surge of AI-Generated Lies

For decades, Wikipedia has been the internet’s Old Reliable—the human-vetted gold standard for facts. But a high-stakes clash between veteran editors and the Open Knowledge Association (OKA) has just exposed a glitch in the Matrix: a surge of AI-generated hallucinations that threaten to poison the well of public knowledge.

What began as a noble quest to translate the world’s encyclopedia has morphed into a cautionary tale about the high cost of cheap information.

Continue reading

3 Steps to Using AI Responsibly

3 Steps to Using AI Responsibly

AI is undoubtedly a powerful tool, providing quick solutions for everything from summarizing lengthy meetings to imagining what our pets would look like as cartoon characters. However, this power comes at a significant environmental cost, with each interaction consuming massive amounts of energy. Understanding this impact is crucial for adopting more sustainable technology practices.

Continue reading

We Aren’t Miracle Workers (But We’re Pretty Darn Close)

We Aren’t Miracle Workers (But We’re Pretty Darn Close)

For a fun little exercise, imagine you’ve just signed up for our managed IT services. Everything’s well and good, but then, something goes wrong with your computer. What gives? Aren’t we supposed to prevent issues from occurring in the first place? It’s easy to get discouraged when freak situations like this occur, but it’s important to highlight what proactive IT solutions can do, and more importantly, what they can’t do.

Continue reading

The 3 Legal Risks That Could Tank Your Business

The 3 Legal Risks That Could Tank Your Business

It sounds like the perfect get-out-of-jail-free card: “I’m so sorry for that error, the AI wrote it!” Unfortunately, that excuse works about as well today as the dog ate my homework in third grade. While AI is an incredible tool, you are still the one holding the leash. If your AI makes a mess, you’re the one who has to clean it up.

Let’s break down why AI makes mistakes and how those slips can turn into real-world headaches for your business.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware AI Managed Service Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Artificial Intelligence Facebook Holiday Automation Compliance Cloud Computing Covid-19 Gadgets Training Server IT Support Managed Service Provider Outsourced IT Remote Work Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Two-factor Authentication Managed Services Mobile Office Data Security Vendor Apps Voice over Internet Protocol Chrome Mobile Device Management Networking Budget Gmail Apple WiFi BYOD App Employer-Employee Relationship Tip of the week Conferencing Avoiding Downtime Office 365 Marketing Managed IT Services How To Password BDR HIPAA Physical Security Applications Computing Access Control Information Technology Hacker Retail Website Office Tips Analytics Healthcare Augmented Reality Storage Bring Your Own Device Big Data Router Virtual Private Network Operating System Health 2FA Help Desk Risk Management Computers Document Management Remote Workers Managed IT Service Telephone Scam Data loss Cooperation Free Resource Firewall Project Management Windows 7 Patch Management Save Money Microsoft 365 The Internet of Things Remote Monitoring Vulnerability End of Support Vendor Management Solutions Going Green Social Display Printer Cybercrime Paperless Office Windows 11 Infrastructure Monitoring Customer Service Excel Saving Time Virtual Machines Virtual Desktop Professional Services Data storage LiFi Wireless Technology Outlook Maintenance Antivirus Downloads Money iPhone Licensing Word Humor Entertainment Vulnerabilities Data Privacy Sports Images 101 Mouse Telephone System Safety Multi-Factor Authentication Robot Mobility Cost Management Administration IT Management VPN Employees Meetings Integration Settings User Tip Printing Modem Wireless Content Filtering Processor Computer Repair Mobile Security Customer Relationship Management Holidays YouTube Data Storage Cryptocurrency Hacking Smart Technology Supply Chain Video Conferencing Presentation Machine Learning Managed Services Provider Lenovo Gig Economy Google Wallet Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Server Management Regulations Compliance Windows 8 IP Address Private Cloud Identity Laptop Evernote Paperless Superfish Bookmark Drones Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Download Net Neutrality Financial Data Error History Halloween Recovery Business Communications Browsers Smartwatch Connectivity IT Hard Drives Social Engineering Break Fix Scams Domains Remote Computing Azure Hybrid Work Upload Procurement Social Network Telework Hacks Cyber security Scary Stories Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Refrigeration Dark Web Cables Fun Public Speaking Alert Trends Supply Chain Management Deep Learning Managed IT Customer Resource management FinTech Lithium-ion battery File Sharing Regulations Dark Data Google Calendar Term Google Apps Entrepreneur Data Analysis Star Wars IT Assessment Education How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Gamification Flexibility Organization Mobile Computing Travel Social Networking Legislation Shortcuts Search Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Undo Ransmoware Best Practice Wearable Technology Memory Vendors Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Buisness Comparison Google Play Be Proactive Unified Threat Management Directions Videos Legal Assessment Electronic Health Records IT solutions Permissions Workforce Business Growth Wasting Time Threats Trend Micro Application Network Congestion Specifications Security Cameras Workplace Strategies Cortana User Error Microchip Internet Exlporer Software as a Service Fraud Meta Alt Codes IBM Managing Costs Amazon Username Point of Sale eCommerce Downtime Black Friday SSID Database Surveillance Hosted Solution Virtual Assistant Outsource IT Typing Tech Support IT Technicians Virtual Machine Environment Media Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Knowledge Google Drive Tactics Development Competition Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Shopping Nanotechnology Optimization PowerPoint 5G Electronic Medical Records Language Employer/Employee Relationships Outsourcing Experience SharePoint Google Docs Addiction Unified Communications Management PCI DSS Bitcoin Chatbots Running Cable User Navigation

Blog Archive