Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Hackers Cloud Software Privacy Productivity Hosted Solutions Data Email Computer Network Security Internet Hardware Innovation User Tips IT Support Malware Business Efficiency Data Backup Tech Term Collaboration Google IT Services Microsoft Business Management Mobile Devices communications Android Communication Small Business Workplace Tips Cybersecurity Social Media Smartphone Data Recovery Smartphones Server Upgrade Backup Browser Phishing Cloud Computing Microsoft Office Data Management Artificial Intelligence Outsourced IT Internet of Things VoIP Productivity Network Managed Service Provider Windows 10 Windows 10 Ransomware Facebook Two-factor Authentication Managed IT Services Automation Mobile Device App Encryption Passwords Government Information Gmail Managed Service Miscellaneous Users Computing Quick Tips Access Control Business Technology Saving Money Windows Office 365 Holiday Bandwidth Disaster Recovery Apple Apps Spam Managed IT Services Applications Office Tips Augmented Reality Business Continuity Big Data Employer-Employee Relationship Going Green BDR Customer Service Cooperation Computers Covid-19 Vulnerability Hacker Retail Office Cybercrime Blockchain Wi-Fi Website Printer Mobile Office Vendor Infrastructure Mobile Device Management BYOD Paperless Office Firewall Tip of the week Analytics IT Support Vendor Management The Internet of Things WiFi Storage Scam Social Data loss Healthcare Conferencing Gadgets Windows 7 Patch Management Hacking Remote Monitoring Presentation Settings Printing Content Filtering Operating System Integration IT Management VPN Wireless Technology Remote Work Avoiding Downtime Cost Management Virtual Private Network Information Technology Risk Management HIPAA Meetings Router Virtual Desktop Data storage LiFi Managed Services Provider Robot Modem Mobile Security Professional Services Processor Save Money Managed Services End of Support Downloads Money Voice over Internet Protocol Safety Chrome Monitoring Humor Document Management Help Desk Budget iPhone Maintenance Virtualization Antivirus Sports Saving Time Display Mouse Bring Your Own Device Managed IT Service Networking Administration Telephone Data Security Current Events Customer Relationship Management Licensing Business Growth Error Competition Social Network Compliance Remote Working Memory Dark Web Data Breach Techology Google Play Entertainment Writing IoT Cortana Trends Electronic Health Records Solutions Twitter Alt Codes Customer Resource management Regulations Wasting Time Microsoft Excel Trend Micro Unified Threat Management Security Cameras Google Maps Downtime Data Analysis User Wireless Star Wars Gamification Staff Software as a Service Hosted Solution Remote Computing Typing Travel Telephone System Social Networking Managing Costs eCommerce User Error SSID IP Address YouTube Fileless Malware Social Engineering Alert Knowledge Content Wearable Technology Surveillance Google Drive Virtual Assistant Cryptocurrency Unified Threat Management Health IT Motherboard Employee/Employer Relationship Virtual Machine Marketing Permissions Holidays Medical IT Directions Recovery 5G Assessment Hard Drives Experience Development Google Docs Transportation Network Management Unified Communications Bitcoin Domains Running Cable Dark Data Word Specifications Hypervisor Fraud Optimization Google Wallet PowerPoint Microchip How To Internet Exlporer Refrigeration Username Video Conferencing Employer/Employee Relationships Windows 8 Public Speaking Laptop User Tip Black Friday Virtual Machines SharePoint Drones Lithium-ion battery Database Entrepreneur IT Technicians Internet Service Provider Outlook Teamwork Lenovo Halloween Proxy Server Cookies Cyber Monday Hotspot Memes Navigation Tactics Tech Support Undo Mirgation Net Neutrality SQL Server Server Management History Superfish Hacks Scary Stories Network Congestion Nanotechnology Smart Technology Language IT Multi-Factor Security Evernote Computer Repair Fun Addiction Websites Management Chatbots Procurement Azure Deep Learning Cyber security Password Identity Theft Screen Reader Distributed Denial of Service Service Level Agreement Computing Infrastructure Communitications Google Calendar Vulnerabilities Education Health Application Machine Learning Identity Supply Chain Management Free Resource Project Management Mobile Computing IBM Bookmark Monitors Smart Tech Download Alerts IT Assessment Legislation How To Tech Electronic Medical Records Search Best Practice Private Cloud Flexibility Value Managed IT Break Fix Multi-Factor Authentication Mobility Tablet Buisness Browsers Connectivity Upload Smart Devices Comparison Legal Microsoft 365 IT solutions Term Virtual Reality