Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Automation Facebook Information Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Chrome Tip of the week Budget Mobile Device Management Apple Gmail App Networking Employer-Employee Relationship BYOD Hacker Office 365 Access Control Avoiding Downtime Conferencing Marketing How To WiFi BDR HIPAA Computing Applications Information Technology Virtual Private Network Computers Help Desk Analytics Office Tips Health Augmented Reality Healthcare Website Storage Password Bring Your Own Device Retail Managed IT Services 2FA Big Data Operating System Router Risk Management Customer Service Display Printer Monitoring Paperless Office Remote Workers Infrastructure Document Management Telephone Free Resource Project Management Windows 7 Firewall Cooperation Scam Microsoft 365 Data loss Windows 11 Solutions Going Green The Internet of Things Excel Patch Management Social Save Money Cybercrime Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Video Conferencing Virtual Desktop Managed Services Provider Hacking Data storage LiFi Professional Services Computer Repair Data Privacy Virtual Machines Presentation Smart Technology Outlook Wireless Technology Saving Time Money Humor iPhone Machine Learning Managed IT Service Vulnerabilities Word Downloads Sports Mouse Licensing Images 101 Maintenance Antivirus Entertainment Administration Multi-Factor Authentication Mobility Safety Telephone System Supply Chain Cost Management Settings Employees Integration Printing Wireless Content Filtering Robot YouTube Cryptocurrency Holidays Customer Relationship Management IT Management User Tip Modem Data Storage VPN Processor Meetings Mobile Security Proxy Server Employer/Employee Relationships Cookies Google Wallet Cyber Monday Human Resources Cables PCI DSS Point of Sale Tactics Navigation Hotspot Mirgation Windows 8 Laptop Gig Economy Google Apps Internet Service Provider Network Management Teamwork User Tech Support Nanotechnology Drones IT Maintenance Regulations Compliance Addiction Evernote Monitors Language Chatbots Halloween Business Intelligence Memes Management Shortcuts Net Neutrality IP Address SQL Server Websites Screen Reader Distributed Denial of Service Ransmoware Financial Data History Service Level Agreement Computing Infrastructure Electronic Medical Records Identity Hacks Scary Stories Vendors Smartwatch SharePoint IT Fun Be Proactive Procurement Bookmark Azure Recovery Smart Tech Deep Learning Workforce Telework Lenovo Cyber security Hard Drives Download Tech Writing Alerts Virtual Reality Threats CES Communitications Domains Workplace Strategies Supply Chain Management Server Management Browsers Private Cloud Connectivity Break Fix Education Meta FinTech Superfish Refrigeration Identity Theft Upload Term Social Network Twitter Mobile Computing Multi-Factor Security Amazon IT Assessment Public Speaking Search Flexibility Lithium-ion battery Value Error IoT Dark Web Best Practice Outsource IT Organization Trends Entrepreneur Social Engineering Customer Resource management Remote Computing Regulations Google Calendar Buisness Environment Digital Security Cameras Media Smart Devices Remote Working Data Analysis Memory Star Wars Legal Microsoft Excel IT solutions Staff Business Growth Small Businesses Data Breach Undo Tablet Gamification Google Play Alert Social Networking Legislation Displays Videos Electronic Health Records Cortana Managed IT Fileless Malware Wasting Time File Sharing Dark Data How To Wearable Technology Alt Codes Outsourcing Trend Micro Content Security Cameras Health IT Notifications Motherboard Comparison Downtime Software as a Service Workplace Directions Managing Costs Application Travel Assessment Permissions Hosted Solution Typing Hiring/Firing Techology eCommerce Google Maps SSID IBM Virtual Assistant Specifications Paperless Surveillance Knowledge Co-managed IT Microchip Virtual Machine Unified Threat Management Internet Exlporer Google Drive Fraud Technology Care Reviews Unified Threat Management Username Medical IT Development Transportation Black Friday 5G Business Communications Experience Scams Hypervisor Database Google Docs Network Congestion Unified Communications PowerPoint IT Technicians Bitcoin Running Cable Hybrid Work Shopping User Error Optimization Competition

Blog Archive