Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Automation Facebook Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Business Technology Virtualization Bandwidth Vendor Mobile Office Two-factor Authentication Apps Data Security Apple BYOD App Mobile Device Management Gmail Tip of the week Managed Services WiFi Voice over Internet Protocol Employer-Employee Relationship Chrome Networking Budget Hacker Avoiding Downtime HIPAA Marketing Applications Access Control Computing Information Technology Conferencing Office 365 How To BDR Computers Bring Your Own Device Website Router Physical Security Virtual Private Network 2FA Operating System Health Help Desk Risk Management Retail Big Data Healthcare Analytics Office Tips Augmented Reality Managed IT Services Storage Password Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Going Green Display Printer Windows 11 Firewall Paperless Office Infrastructure Cybercrime Monitoring Excel The Internet of Things Document Management Remote Workers Social Telephone Scam Data loss Free Resource Project Management Cooperation Windows 7 Customer Service Microsoft 365 Presentation Telephone System Mouse Robot Cost Management Wireless Technology Administration Employees Integration IT Management VPN Meetings User Tip Word Modem Computer Repair Mobile Security Settings Holidays Processor Printing Wireless Data Storage Content Filtering Supply Chain YouTube Video Conferencing Smart Technology Managed Services Provider Cryptocurrency Safety Virtual Machines Professional Services Machine Learning Saving Time Virtual Desktop LiFi Managed IT Service Data storage Maintenance iPhone Antivirus Downloads Outlook Licensing Vulnerabilities Data Privacy Money Customer Relationship Management Entertainment Humor Images 101 Multi-Factor Authentication Mobility Sports Hacking Remote Working Memory Vendors Travel Social Networking Education Legislation Data Breach Techology Fileless Malware User Google Play Be Proactive Google Maps Workforce Content Mobile Computing Wearable Technology Videos Electronic Health Records Search Wasting Time Threats Health IT Unified Threat Management Motherboard Comparison Best Practice Permissions IP Address Trend Micro Unified Threat Management Directions Security Cameras Workplace Strategies Assessment Meta Buisness Software as a Service Managing Costs Amazon Legal IT solutions Network Congestion Specifications Internet Exlporer Business Growth Fraud eCommerce User Error Microchip Recovery SSID Hard Drives Virtual Assistant Outsource IT Username Surveillance Black Friday Cortana Domains Virtual Machine Environment Media Point of Sale Database Alt Codes Reviews Medical IT Refrigeration Transportation Small Businesses Network Management Tech Support IT Technicians Downtime Development Monitors Cyber Monday Public Speaking Hypervisor Displays Proxy Server Cookies Hosted Solution Tactics Typing Hotspot Shopping Lithium-ion battery Optimization PowerPoint Employer/Employee Relationships Outsourcing Entrepreneur Websites Mirgation PCI DSS Knowledge Navigation Google Drive Nanotechnology Addiction Electronic Medical Records Language Gig Economy SharePoint Workplace 5G Undo Teamwork Hiring/Firing Management Chatbots Internet Service Provider Unified Communications Writing Distributed Denial of Service Regulations Compliance Experience Lenovo Evernote Paperless Google Docs Screen Reader Service Level Agreement Bitcoin Virtual Reality Computing Infrastructure Running Cable Memes Co-managed IT SQL Server Technology Care Server Management Google Wallet Private Cloud Identity Net Neutrality Financial Data History Superfish Bookmark Business Communications Identity Theft Smart Tech Download Windows 8 Twitter Alerts Smartwatch Laptop IT Application Scams Azure Hybrid Work Drones Error Procurement Social Engineering Break Fix Telework IBM Cyber security Browsers Tech Human Resources Connectivity Upload Remote Computing CES Halloween Communitications Cables Social Network Multi-Factor Security Supply Chain Management Dark Web FinTech Term Google Apps Tablet IoT Trends Hacks Alert Scary Stories IT Assessment IT Maintenance Flexibility Fun Competition Value Business Intelligence Managed IT Customer Resource management File Sharing Regulations Dark Data Google Calendar Deep Learning How To Microsoft Excel Organization Data Analysis Shortcuts Star Wars Ransmoware Gamification Notifications Staff Digital Security Cameras Smart Devices

Blog Archive