Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google Email Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Passwords Saving Money Quick Tips Managed Service Cybersecurity Communication Data Backup Smartphone Android Data Recovery Upgrade AI Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Automation Artificial Intelligence Information Facebook Holiday Training Gadgets Cloud Computing Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Government Data Management Business Continuity Virtualization Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Apps Two-factor Authentication Mobile Office Data Security Vendor Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail Budget BYOD WiFi Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime How To Marketing BDR Office 365 HIPAA Applications Big Data Health 2FA Help Desk Operating System Retail Computers Healthcare Risk Management Managed IT Services Website Analytics Office Tips Augmented Reality Storage Router Password Virtual Private Network Bring Your Own Device Printer Windows 11 Paperless Office Social Infrastructure Monitoring Going Green Excel Document Management Customer Service Remote Workers Cybercrime Telephone Scam Data loss Free Resource Cooperation Project Management Windows 7 Patch Management Microsoft 365 Save Money Remote Monitoring Firewall Vulnerability End of Support Solutions Vendor Management Physical Security The Internet of Things Display Computer Repair Mobile Security Processor Administration Holidays Data Storage Supply Chain Smart Technology Video Conferencing Customer Relationship Management Managed Services Provider Machine Learning Professional Services Saving Time Virtual Machines Settings Wireless Printing Content Filtering Managed IT Service Hacking Maintenance YouTube Presentation Antivirus Downloads iPhone Cryptocurrency Wireless Technology Licensing Vulnerabilities Entertainment Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Outlook Telephone System Multi-Factor Authentication Robot Mobility Cost Management Money Humor IT Management Safety Employees VPN Meetings Sports Integration Mouse User Tip Modem Surveillance Database Virtual Assistant Outsource IT Mobile Computing Network Management Virtual Machine Environment Tech Support IT Technicians Search Media Medical IT Monitors Cyber Monday Reviews Proxy Server Application Best Practice Cookies Development Tactics Buisness Transportation Small Businesses Hotspot IBM Legal IT solutions Hypervisor Displays Websites Mirgation PowerPoint Shopping Business Growth Optimization Nanotechnology Addiction Employer/Employee Relationships Outsourcing Electronic Medical Records Language SharePoint PCI DSS Management Chatbots Cortana Navigation Workplace Writing Distributed Denial of Service Gig Economy Lenovo Alt Codes Screen Reader Internet Service Provider Service Level Agreement Downtime Teamwork Hiring/Firing Virtual Reality Computing Infrastructure Competition Regulations Compliance Server Management Hosted Solution Private Cloud Identity Paperless Evernote Co-managed IT Superfish Bookmark Typing Memes Identity Theft Smart Tech Net Neutrality Download SQL Server Technology Care Twitter Alerts Google Drive Financial Data User History Error Knowledge Business Communications Scams Social Engineering Break Fix Smartwatch Browsers IT Connectivity Procurement Upload Azure Hybrid Work Remote Computing 5G IP Address Google Docs Telework Social Network Unified Communications Cyber security Experience Human Resources Multi-Factor Security Tech Running Cable Cables Dark Web CES Bitcoin Communitications Tablet IoT Google Wallet Supply Chain Management Trends Alert FinTech Managed IT Customer Resource management Recovery File Sharing Regulations Google Apps Dark Data Google Calendar Term Laptop IT Maintenance How To Microsoft Excel Data Analysis Hard Drives Windows 8 IT Assessment Star Wars Domains Drones Flexibility Gamification Value Business Intelligence Notifications Staff Organization Travel Social Networking Shortcuts Legislation Halloween Ransmoware Digital Security Cameras Techology Fileless Malware Refrigeration Smart Devices Google Maps Public Speaking Remote Working Content Memory Vendors Wearable Technology Lithium-ion battery Health IT Data Breach Unified Threat Management Motherboard Be Proactive Comparison Google Play Entrepreneur Scary Stories Workforce Permissions Videos Unified Threat Management Directions Hacks Electronic Health Records Assessment Wasting Time Threats Fun Deep Learning Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Software as a Service Internet Exlporer Meta Fraud User Error Microchip Undo Username Education Managing Costs Amazon SSID Black Friday eCommerce Point of Sale

Blog Archive