Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Backup Productivity Microsoft Quick Tips Managed Service Saving Money Passwords Cybersecurity Communication Smartphone Data Backup Android AI Upgrade Disaster Recovery Data Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Cloud Computing Training Gadgets Covid-19 Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Government Data Management Business Continuity Wi-Fi Windows 10 Business Technology Virtualization Blockchain Bandwidth Mobile Office Two-factor Authentication Apps Vendor Data Security Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail WiFi Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking App Marketing Conferencing Computing Information Technology Access Control Office 365 HIPAA Applications How To Hacker BDR Avoiding Downtime Website Operating System Healthcare Virtual Private Network Risk Management Health Analytics Office Tips Big Data Augmented Reality Retail Storage Router Password Bring Your Own Device Managed IT Services Computers 2FA Help Desk Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Remote Workers Physical Security Telephone Firewall Display Printer Cooperation Free Resource Paperless Office Project Management Infrastructure Windows 7 The Internet of Things Microsoft 365 Document Management Social Solutions Scam Data loss Customer Service Windows 11 Monitoring Going Green Patch Management Excel Save Money Virtual Machines Professional Services Settings Saving Time Wireless Printing Content Filtering Word IT Management Managed IT Service VPN YouTube Meetings Downloads Cryptocurrency iPhone Licensing Computer Repair Entertainment Vulnerabilities Safety Data Privacy Virtual Desktop LiFi Data storage Images 101 Outlook Multi-Factor Authentication Mobility Telephone System Cost Management Machine Learning Money Humor Maintenance Employees Antivirus Integration Sports Customer Relationship Management Mouse Modem User Tip Processor Mobile Security Administration Hacking Holidays Presentation Data Storage Smart Technology Supply Chain Wireless Technology Robot Video Conferencing Managed Services Provider Screen Reader Alt Codes Distributed Denial of Service Workplace Gig Economy Recovery Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Downtime Unified Threat Management Hosted Solution Evernote Paperless Hard Drives Regulations Compliance Unified Threat Management Identity Smart Tech Memes Typing Co-managed IT Domains Bookmark Network Congestion Download Net Neutrality Alerts SQL Server Technology Care Business Communications Knowledge Refrigeration Financial Data Google Drive User Error History Connectivity IT Break Fix Scams Public Speaking Browsers Smartwatch Lithium-ion battery 5G Upload Procurement Azure Hybrid Work Point of Sale Unified Communications Multi-Factor Security Tech Human Resources Experience Social Network Telework Entrepreneur Google Docs Cyber security CES IoT Communitications Bitcoin Network Management Dark Web Cables Running Cable Tech Support Monitors Trends Supply Chain Management Google Wallet Regulations Google Calendar Term Google Apps Undo Customer Resource management FinTech Data Analysis Star Wars IT Assessment Windows 8 Microsoft Excel IT Maintenance Laptop Websites Gamification Flexibility Drones Staff Value Business Intelligence SharePoint Social Networking Legislation Shortcuts Electronic Medical Records Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Halloween Writing Application Content Remote Working Lenovo Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Virtual Reality Health IT Directions Videos Assessment Electronic Health Records Hacks Server Management Permissions Workforce Scary Stories Private Cloud IBM Identity Theft Fun Superfish Wasting Time Threats Trend Micro Deep Learning Specifications Security Cameras Workplace Strategies Twitter Microchip Internet Exlporer Software as a Service Fraud Meta Error Education Social Engineering Username Managing Costs Amazon eCommerce Black Friday SSID Remote Computing Competition Database Surveillance Mobile Computing Virtual Assistant Outsource IT Tablet Media Search IT Technicians Virtual Machine Environment Cookies Best Practice Cyber Monday Medical IT Alert Proxy Server Reviews Dark Data User Tactics Development Managed IT Hotspot Transportation Small Businesses Buisness File Sharing IT solutions How To Legal Mirgation Hypervisor Displays Nanotechnology Optimization Business Growth PowerPoint Notifications Shopping Addiction Language Employer/Employee Relationships Outsourcing Travel IP Address Google Maps Navigation Cortana Management PCI DSS Techology Chatbots

Blog Archive