Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy Workplace Tips IT Services Email Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Information Artificial Intelligence Holiday Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Managed Service Provider Compliance Remote Work Server Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Mobile Office Data Security Two-factor Authentication Vendor Apps Networking Mobile Device Management Gmail BYOD WiFi Chrome Budget Employer-Employee Relationship Apple Tip of the week App Managed Services Voice over Internet Protocol Marketing Computing How To Information Technology BDR Office 365 HIPAA Applications Access Control Hacker Conferencing Avoiding Downtime Website Operating System Healthcare Managed IT Services Risk Management Analytics Office Tips Router Augmented Reality Big Data Physical Security Virtual Private Network Storage Password Bring Your Own Device Health Help Desk 2FA Computers Retail Scam Data loss Cybercrime Cooperation Firewall Free Resource Project Management Patch Management Windows 7 Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support The Internet of Things Vendor Management Solutions Social Display Printer Paperless Office Infrastructure Monitoring Windows 11 Customer Service Document Management Excel Going Green Remote Workers Telephone Content Filtering Licensing iPhone YouTube Entertainment Word Cryptocurrency Vulnerabilities Data Privacy Telephone System Virtual Desktop Robot Images 101 Data storage Cost Management LiFi Safety Multi-Factor Authentication Mobility Outlook IT Management VPN Money Meetings Humor Employees User Tip Integration Modem Processor Computer Repair Mobile Security Sports Mouse Customer Relationship Management Holidays Administration Smart Technology Data Storage Machine Learning Hacking Supply Chain Saving Time Presentation Video Conferencing Managed Services Provider Virtual Machines Professional Services Managed IT Service Wireless Technology Maintenance Settings Downloads Wireless Antivirus Printing Net Neutrality Browsers SQL Server Technology Care Connectivity Hosted Solution Social Engineering Break Fix Financial Data Recovery History Upload Business Communications Typing Remote Computing Scams Multi-Factor Security Smartwatch Hard Drives IT Social Network Domains Procurement Azure Hybrid Work Google Drive Tablet IoT Dark Web Knowledge Telework Cyber security Trends Tech Human Resources Alert Managed IT Customer Resource management Cables File Sharing Regulations Dark Data Google Calendar 5G CES Refrigeration Communitications Public Speaking Supply Chain Management Data Analysis Google Docs Star Wars Unified Communications How To Microsoft Excel Experience Notifications Staff Running Cable Lithium-ion battery FinTech Gamification Term Google Apps Bitcoin Entrepreneur IT Maintenance Google Wallet Travel Social Networking Legislation IT Assessment Flexibility Techology Fileless Malware Value Business Intelligence Google Maps Wearable Technology Laptop Organization Content Shortcuts Windows 8 Health IT Ransmoware Drones Unified Threat Management Motherboard Comparison Digital Security Cameras Undo Smart Devices Remote Working Unified Threat Management Directions Memory Vendors Assessment Permissions Halloween Data Breach Google Play Be Proactive Workforce Network Congestion Specifications Videos Electronic Health Records User Error Microchip Wasting Time Threats Internet Exlporer Fraud Scary Stories Application Trend Micro Username Security Cameras Workplace Strategies Hacks Meta Point of Sale Black Friday Fun Software as a Service IBM Managing Costs Amazon Database Deep Learning Tech Support IT Technicians eCommerce Network Management SSID Proxy Server Virtual Assistant Outsource IT Cookies Education Monitors Cyber Monday Surveillance Virtual Machine Environment Tactics Media Hotspot Websites Mirgation Reviews Medical IT Mobile Computing Transportation Small Businesses Nanotechnology Search Competition Development SharePoint Hypervisor Displays Addiction Best Practice Electronic Medical Records Language Chatbots Buisness Shopping Optimization Management PowerPoint Lenovo Employer/Employee Relationships Outsourcing Legal Screen Reader IT solutions Writing Distributed Denial of Service PCI DSS User Service Level Agreement Navigation Business Growth Virtual Reality Computing Infrastructure Private Cloud Identity Gig Economy Server Management Workplace Superfish Bookmark Teamwork Hiring/Firing Identity Theft Smart Tech Cortana Internet Service Provider IP Address Regulations Compliance Download Evernote Paperless Alt Codes Twitter Alerts Error Downtime Memes Co-managed IT

Blog Archive