Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Managed Service Smartphone Android Upgrade Business Management Smartphones VoIP AI communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Holiday Training Miscellaneous Gadgets Covid-19 Cloud Computing Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Spam Encryption Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Mobile Office Two-factor Authentication Data Security Apps Mobile Device Management Tip of the week Managed Services Voice over Internet Protocol Gmail Chrome Budget Networking Apple Employer-Employee Relationship App BYOD Hacker HIPAA Avoiding Downtime Computing Applications Marketing Information Technology Access Control Office 365 Conferencing WiFi How To BDR Computers Operating System Virtual Private Network Router Website Health Risk Management Help Desk Analytics Office Tips Retail Healthcare Augmented Reality Storage Managed IT Services Password Big Data Bring Your Own Device 2FA Physical Security Cybercrime Display Printer Paperless Office Infrastructure Firewall Monitoring Document Management Remote Workers Scam The Internet of Things Data loss Free Resource Project Management Telephone Windows 11 Social Windows 7 Microsoft 365 Patch Management Cooperation Save Money Excel Remote Monitoring Solutions Vulnerability End of Support Customer Service Vendor Management Going Green VPN Settings Meetings Presentation Wireless Printing Content Filtering Wireless Technology Computer Repair Holidays YouTube Cryptocurrency Data Privacy Data Storage User Tip Modem Mobile Security Video Conferencing Processor Word Managed Services Provider Virtual Machines Professional Services Virtual Desktop LiFi Machine Learning Data storage Smart Technology Outlook Maintenance Safety Saving Time Money iPhone Antivirus Humor Managed IT Service Vulnerabilities Sports Downloads Images 101 Mouse Licensing Multi-Factor Authentication Mobility Supply Chain Entertainment Administration Robot Customer Relationship Management Employees Telephone System Cost Management IT Management Hacking Integration Managing Costs Content Alt Codes Wearable Technology Technology Care Network Congestion Comparison User Business Communications eCommerce Health IT SSID User Error Motherboard Downtime Assessment Hosted Solution Permissions Scams Surveillance Directions Virtual Assistant Virtual Machine Typing Point of Sale Hybrid Work Specifications IP Address Reviews Human Resources Medical IT Internet Exlporer Network Management Fraud Knowledge Tech Support Cables Development Microchip Google Drive Transportation Hypervisor Username Monitors Black Friday 5G Shopping Recovery Google Apps Optimization PowerPoint Database Unified Communications Experience Websites Hard Drives IT Maintenance Google Docs Employer/Employee Relationships Bitcoin Navigation IT Technicians Running Cable Domains Business Intelligence PCI DSS Cyber Monday Gig Economy Electronic Medical Records Shortcuts Proxy Server Google Wallet SharePoint Cookies Tactics Hotspot Refrigeration Ransmoware Internet Service Provider Teamwork Windows 8 Evernote Lenovo Mirgation Laptop Public Speaking Vendors Regulations Compliance Writing Lithium-ion battery Virtual Reality Be Proactive Memes Drones Nanotechnology Addiction Server Management Language Private Cloud Workforce Net Neutrality Entrepreneur SQL Server Financial Data History Management Superfish Chatbots Halloween Identity Theft Threats Distributed Denial of Service Smartwatch Twitter Workplace Strategies IT Screen Reader Azure Service Level Agreement Computing Infrastructure Error Undo Meta Procurement Telework Social Engineering Cyber security Hacks Tech Identity Scary Stories Amazon Fun CES Remote Computing Communitications Bookmark Smart Tech Download Deep Learning Alerts Outsource IT Supply Chain Management FinTech Media Term Tablet Environment Break Fix Alert Application IT Assessment Browsers Connectivity Education Value Upload Managed IT File Sharing Small Businesses Flexibility Dark Data Displays Organization How To Social Network Mobile Computing Multi-Factor Security IBM Dark Web Search Digital Security Cameras Notifications Smart Devices IoT Memory Trends Best Practice Travel Outsourcing Remote Working Data Breach Customer Resource management Google Play Techology Regulations Buisness Google Maps Google Calendar IT solutions Microsoft Excel Videos Workplace Electronic Health Records Data Analysis Legal Star Wars Wasting Time Gamification Business Growth Staff Unified Threat Management Competition Hiring/Firing Paperless Trend Micro Security Cameras Unified Threat Management Social Networking Legislation Cortana Co-managed IT Software as a Service Fileless Malware

Blog Archive