Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Productivity Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade AI VoIP Business Management Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Information Facebook Training Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Blockchain Windows 10 Virtualization Wi-Fi Mobile Office Vendor Data Security Apps Two-factor Authentication Chrome Budget Tip of the week Mobile Device Management Gmail Apple App Networking Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Office 365 Avoiding Downtime Access Control Marketing HIPAA WiFi How To Applications BDR Computing Information Technology Conferencing Hacker Analytics Office Tips Health Augmented Reality Website Storage Password Retail Bring Your Own Device Router Managed IT Services Big Data Operating System Healthcare 2FA Help Desk Risk Management Computers Virtual Private Network Printer Telephone Microsoft 365 Paperless Office Infrastructure Solutions Cooperation Document Management Firewall Scam Data loss The Internet of Things Going Green Social Remote Workers Patch Management Windows 11 Cybercrime Save Money Remote Monitoring Monitoring Vulnerability End of Support Vendor Management Excel Customer Service Free Resource Physical Security Project Management Windows 7 Display Computer Repair Multi-Factor Authentication Mobility Wireless Technology Downloads Outlook Licensing Money Humor Entertainment Data Privacy Employees Word Machine Learning Integration Sports Mouse Telephone System Cost Management Maintenance Holidays Antivirus Administration Safety Data Storage Video Conferencing Managed Services Provider Virtual Machines Professional Services User Tip Modem Settings Mobile Security Processor Printing Wireless Content Filtering Robot YouTube iPhone Customer Relationship Management Smart Technology Supply Chain Cryptocurrency IT Management Vulnerabilities VPN Saving Time Meetings Hacking Virtual Desktop Images 101 Presentation Managed IT Service Data storage LiFi Technology Care Laptop Organization Download Alerts Windows 8 Drones Network Management Digital Security Cameras Tech Support Business Communications Smart Devices IP Address Memory Break Fix Browsers Scams Remote Working Connectivity Monitors Hybrid Work Halloween Upload Data Breach Google Play Videos Social Network Websites Human Resources Electronic Health Records Multi-Factor Security Wasting Time Dark Web Recovery Cables IoT Scary Stories Trends Electronic Medical Records Trend Micro Hard Drives Security Cameras SharePoint Hacks Customer Resource management Google Apps Fun Software as a Service Regulations Domains Google Calendar Writing Managing Costs Microsoft Excel Lenovo Deep Learning Data Analysis IT Maintenance Star Wars Business Intelligence Gamification Virtual Reality eCommerce Staff Refrigeration SSID Server Management Education Private Cloud Shortcuts Surveillance Social Networking Public Speaking Virtual Assistant Legislation Lithium-ion battery Virtual Machine Superfish Fileless Malware Identity Theft Ransmoware Vendors Reviews Content Twitter Wearable Technology Medical IT Entrepreneur Mobile Computing Comparison Health IT Error Be Proactive Search Development Motherboard Transportation Assessment Social Engineering Hypervisor Permissions Best Practice Directions Workforce Threats Buisness Shopping Remote Computing Optimization Undo PowerPoint Specifications Legal IT solutions Workplace Strategies Employer/Employee Relationships Meta PCI DSS Internet Exlporer Fraud Navigation Business Growth Microchip Tablet Amazon Gig Economy Username Alert Teamwork Black Friday Managed IT File Sharing Cortana Internet Service Provider Dark Data Outsource IT Regulations Compliance Database How To Application Evernote Alt Codes Environment Downtime Notifications Media Memes IT Technicians IBM SQL Server Cyber Monday Hosted Solution Proxy Server Travel Net Neutrality Cookies Small Businesses Financial Data Tactics History Hotspot Techology Typing Google Maps Displays Smartwatch IT Mirgation Azure Google Drive Unified Threat Management Knowledge Procurement Nanotechnology Outsourcing Telework Addiction Cyber security Language Tech Unified Threat Management CES Management 5G Communitications Chatbots Competition Distributed Denial of Service Google Docs Unified Communications Workplace Experience Supply Chain Management Screen Reader Network Congestion Hiring/Firing Running Cable FinTech Service Level Agreement Computing Infrastructure Term User Error Bitcoin Google Wallet Paperless IT Assessment Identity Value User Bookmark Point of Sale Co-managed IT Flexibility Smart Tech

Blog Archive