Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Backup Small Business Hosted Solutions Collaboration Ransomware Users Managed Service AI Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Facebook Artificial Intelligence Covid-19 Training Gadgets Compliance Cloud Computing Managed Service Provider Remote Work IT Support Outsourced IT Server Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Vendor Windows 10 Business Technology Virtualization Bandwidth Blockchain Two-factor Authentication Managed Services Apps Data Security Mobile Office Mobile Device Management Gmail Tip of the week WiFi Chrome Budget Voice over Internet Protocol Employer-Employee Relationship Apple Networking App BYOD Computing HIPAA Physical Security Information Technology Applications Access Control Office 365 Conferencing Password Managed IT Services How To BDR Hacker Avoiding Downtime Marketing Router Virtual Private Network Risk Management Health Analytics 2FA Office Tips Help Desk Augmented Reality Big Data Retail Storage Bring Your Own Device Healthcare Computers Operating System Website Solutions Display Firewall Printer Paperless Office Infrastructure Windows 11 The Internet of Things Monitoring Document Management Excel Social Remote Workers Managed IT Service Scam Telephone Data loss Customer Service Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Vendor Management Cybercrime VPN YouTube Meetings Word Employees Cryptocurrency Integration Computer Repair User Tip Modem Processor Mobile Security Virtual Desktop LiFi Data storage Safety Holidays Data Storage Outlook Smart Technology Supply Chain Machine Learning Video Conferencing Money Humor Managed Services Provider Saving Time Virtual Machines Professional Services Maintenance Antivirus Sports Mouse Customer Relationship Management Downloads iPhone Licensing Administration Entertainment Hacking Vulnerabilities Data Privacy Presentation Robot Images 101 Wireless Technology Telephone System Multi-Factor Authentication Mobility Settings Wireless Cost Management Printing Content Filtering IT Management Network Congestion Directions Videos Assessment Electronic Health Records Hard Drives Permissions Workforce Domains Wasting Time Threats Knowledge Google Drive User Error Trend Micro Specifications Security Cameras Workplace Strategies 5G Microchip Internet Exlporer Software as a Service Refrigeration Fraud Meta Point of Sale Public Speaking Managing Costs Amazon Unified Communications Experience Username Google Docs Lithium-ion battery eCommerce Bitcoin Network Management Black Friday SSID Running Cable Tech Support Entrepreneur Monitors Database Surveillance Google Wallet Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Proxy Server Reviews Cookies Windows 8 Cyber Monday Medical IT Laptop Websites Tactics Development Drones Undo Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Electronic Medical Records SharePoint Shopping Nanotechnology Optimization PowerPoint Halloween Writing Addiction Lenovo Language Employer/Employee Relationships Outsourcing Chatbots Navigation Virtual Reality Management PCI DSS Gig Economy Screen Reader Hacks Server Management Application Distributed Denial of Service Workplace Scary Stories Private Cloud Identity Theft Fun Service Level Agreement Internet Service Provider Superfish Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance IBM Identity Deep Learning Evernote Paperless Twitter Bookmark Smart Tech Memes Co-managed IT Error Alerts SQL Server Technology Care Education Social Engineering Download Net Neutrality Financial Data History Business Communications Remote Computing Browsers Smartwatch Connectivity IT Mobile Computing Break Fix Scams Azure Hybrid Work Tablet Search Upload Procurement Competition Social Network Telework Cyber security Best Practice Multi-Factor Security Tech Human Resources Alert Dark Data CES IoT Communitications Managed IT Dark Web Cables Buisness File Sharing IT solutions How To Trends Supply Chain Management Legal Customer Resource management FinTech Regulations Business Growth User Google Calendar Term Google Apps Notifications Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Travel Staff Value Business Intelligence Google Maps Cortana Gamification Flexibility Techology Organization IP Address Social Networking Alt Codes Legislation Shortcuts Fileless Malware Digital Security Cameras Smart Devices Ransmoware Downtime Unified Threat Management Wearable Technology Memory Vendors Hosted Solution Content Remote Working Unified Threat Management Health IT Motherboard Data Breach Typing Recovery Comparison Google Play Be Proactive

Blog Archive