Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Managed Service Microsoft Productivity Passwords Saving Money Quick Tips Communication Cybersecurity Smartphone AI Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Miscellaneous Holiday Automation Cloud Computing Covid-19 Gadgets Training Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Chrome Mobile Device Management Networking Budget Gmail Apple WiFi BYOD App Employer-Employee Relationship Tip of the week Avoiding Downtime Conferencing Marketing Office 365 How To BDR HIPAA Applications Access Control Computing Information Technology Hacker Retail Website Healthcare Analytics Office Tips Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data Router 2FA Physical Security Virtual Private Network Operating System Health Help Desk Computers Risk Management Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 The Internet of Things Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Solutions Social Going Green Display Excel Printer Paperless Office Cybercrime Infrastructure Customer Service Monitoring Saving Time Virtual Machines Professional Services Wireless Technology Virtual Desktop Data Privacy Data storage Managed IT Service LiFi Maintenance Downloads Antivirus Outlook iPhone Word Licensing Money Entertainment Humor Vulnerabilities Images 101 Sports Multi-Factor Authentication Mouse Robot Mobility Safety Telephone System Cost Management Administration IT Management VPN Employees Meetings Supply Chain Integration User Tip Modem Settings Processor Computer Repair Mobile Security Printing Customer Relationship Management Wireless Holidays Content Filtering YouTube Data Storage Hacking Smart Technology Presentation Video Conferencing Cryptocurrency Machine Learning Managed Services Provider Lenovo Gig Economy Screen Reader Google Docs Writing Distributed Denial of Service Unified Communications Experience Human Resources Running Cable Cables Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Bitcoin Private Cloud Identity Google Wallet Evernote IP Address Server Management Regulations Compliance Google Apps Superfish Bookmark Identity Theft Smart Tech Memes Laptop IT Maintenance Download Net Neutrality Twitter Alerts SQL Server Windows 8 Error History Drones Business Intelligence Recovery Financial Data Shortcuts Hard Drives Browsers Smartwatch Connectivity IT Social Engineering Break Fix Halloween Ransmoware Domains Upload Procurement Remote Computing Azure Cyber security Multi-Factor Security Tech Vendors Social Network Telework Be Proactive Refrigeration CES Tablet IoT Communitications Dark Web Hacks Scary Stories Workforce Public Speaking Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Threats Lithium-ion battery Fun Managed IT Customer Resource management FinTech Workplace Strategies Data Analysis Entrepreneur Star Wars IT Assessment How To Microsoft Excel Deep Learning Meta Gamification Flexibility Notifications Staff Value Travel Social Networking Legislation Education Amazon Organization Undo Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Mobile Computing Outsource IT Content Remote Working Wearable Technology Memory Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Environment Search Media Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Best Practice Wasting Time Buisness Small Businesses Trend Micro Legal Network Congestion Specifications Security Cameras IT solutions Displays Application User Error Microchip Internet Exlporer Software as a Service Fraud Business Growth Managing Costs Outsourcing IBM Username Point of Sale eCommerce Black Friday SSID Cortana Workplace Database Surveillance Virtual Assistant Alt Codes Tech Support IT Technicians Virtual Machine Downtime Hiring/Firing Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hosted Solution Paperless Co-managed IT Competition Tactics Development Hotspot Transportation Typing Websites Mirgation Hypervisor Technology Care Shopping Nanotechnology Optimization Google Drive PowerPoint Knowledge Business Communications Scams SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Chatbots Navigation Hybrid Work 5G User Management PCI DSS

Blog Archive