Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Productivity Smartphone Managed Service Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Facebook Information Automation Artificial Intelligence Cloud Computing Miscellaneous Holiday Training Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Spam IT Support Employee/Employer Relationship Compliance Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Virtualization Business Technology Bandwidth Windows 10 Blockchain Vendor Two-factor Authentication Apps Mobile Office Data Security BYOD Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking Mobile Device Management App Gmail Managed Services Voice over Internet Protocol WiFi HIPAA Computing Applications Information Technology Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To BDR Operating System Router Big Data Virtual Private Network Risk Management Health Help Desk Analytics Office Tips Computers Augmented Reality Retail Storage Password Website Bring Your Own Device 2FA Managed IT Services Healthcare Vendor Management The Internet of Things Cybercrime Physical Security Free Resource Social Project Management Display Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Monitoring Customer Service Solutions Document Management Telephone Windows 11 Scam Data loss Cooperation Excel Firewall Going Green Patch Management Save Money Remote Workers Remote Monitoring End of Support Vulnerability Content Filtering iPhone IT Management VPN YouTube Meetings Vulnerabilities Cryptocurrency Data Privacy User Tip Modem Images 101 Computer Repair Mobile Security Processor Multi-Factor Authentication Mobility Virtual Desktop Customer Relationship Management LiFi Data storage Smart Technology Outlook Hacking Machine Learning Money Saving Time Employees Presentation Humor Integration Managed IT Service Wireless Technology Maintenance Downloads Antivirus Sports Holidays Mouse Licensing Data Storage Administration Word Supply Chain Entertainment Video Conferencing Managed Services Provider Virtual Machines Professional Services Robot Telephone System Cost Management Safety Settings Wireless Printing Hosted Solution Assessment IT Permissions Scams Unified Threat Management Directions Smartwatch Typing Procurement Azure Hybrid Work Network Congestion Specifications Tech Human Resources Telework Cyber security CES Internet Exlporer Communitications Knowledge Fraud Cables Google Drive User Error Microchip Username Supply Chain Management Application 5G Black Friday Term Google Apps FinTech Point of Sale IBM Unified Communications Database IT Assessment Experience IT Maintenance Google Docs Bitcoin Network Management Flexibility Running Cable Tech Support IT Technicians Value Business Intelligence Monitors Cyber Monday Shortcuts Google Wallet Proxy Server Organization Cookies Digital Security Cameras Tactics Smart Devices Hotspot Ransmoware Windows 8 Remote Working Laptop Websites Mirgation Memory Vendors Data Breach Google Play Be Proactive Drones Competition Nanotechnology Videos Addiction Electronic Health Records Electronic Medical Records Language Workforce SharePoint Management Halloween Chatbots Wasting Time Threats Trend Micro Writing Distributed Denial of Service Security Cameras Workplace Strategies Lenovo Screen Reader Service Level Agreement Software as a Service User Virtual Reality Computing Infrastructure Meta Hacks Server Management Scary Stories Private Cloud Identity Managing Costs Amazon Identity Theft Smart Tech eCommerce Fun SSID Superfish Bookmark IP Address Deep Learning Download Surveillance Twitter Alerts Virtual Assistant Outsource IT Media Error Virtual Machine Environment Education Connectivity Social Engineering Break Fix Medical IT Browsers Reviews Upload Development Recovery Remote Computing Transportation Small Businesses Multi-Factor Security Mobile Computing Social Network Hard Drives Hypervisor Displays Tablet IoT Optimization Search Dark Web PowerPoint Shopping Domains Best Practice Trends Alert Employer/Employee Relationships Outsourcing Dark Data Google Calendar Navigation Managed IT Customer Resource management PCI DSS Refrigeration Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel Workplace Legal Data Analysis Gig Economy Public Speaking Lithium-ion battery Business Growth Gamification Internet Service Provider Notifications Staff Teamwork Hiring/Firing Legislation Evernote Paperless Regulations Compliance Travel Social Networking Entrepreneur Google Maps Memes Cortana Co-managed IT Techology Fileless Malware Alt Codes Content Net Neutrality Wearable Technology SQL Server Technology Care Comparison Business Communications Health IT Financial Data Undo Downtime Unified Threat Management Motherboard History

Blog Archive