Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Cybersecurity Saving Money Communication Managed Service Smartphone Data Backup Android Upgrade AI Business Management VoIP Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Artificial Intelligence Facebook Automation Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Bandwidth Virtualization Business Technology Blockchain Vendor Data Security Mobile Office Two-factor Authentication Apps Networking Mobile Device Management BYOD Gmail Chrome Budget Managed Services Voice over Internet Protocol Apple Tip of the week Employer-Employee Relationship App Hacker HIPAA Computing How To Applications BDR Avoiding Downtime Information Technology Marketing Office 365 Conferencing Access Control WiFi Computers Operating System Managed IT Services Router Risk Management Website Help Desk Analytics Office Tips Augmented Reality Virtual Private Network Storage Password Health Big Data Bring Your Own Device 2FA Healthcare Retail Scam Customer Service Free Resource Project Management Data loss Windows 7 Cybercrime Microsoft 365 Solutions Patch Management Save Money Remote Monitoring End of Support Vulnerability Monitoring Vendor Management Firewall Physical Security Display Printer The Internet of Things Paperless Office Telephone Infrastructure Windows 11 Social Remote Workers Cooperation Document Management Excel Going Green Settings Wireless Printing Hacking Images 101 Content Filtering Presentation Multi-Factor Authentication Mobility YouTube Wireless Technology Cryptocurrency Data Privacy User Tip Modem Mobile Security Robot Processor Employees Virtual Desktop LiFi Word Integration Data storage IT Management Smart Technology Meetings Outlook VPN Holidays Saving Time Money Humor Safety Computer Repair Data Storage Managed IT Service Video Conferencing Managed Services Provider Downloads Sports Virtual Machines Professional Services Mouse Licensing Machine Learning Supply Chain Entertainment Administration iPhone Customer Relationship Management Telephone System Maintenance Vulnerabilities Cost Management Antivirus Content Wearable Technology Alt Codes Social Engineering Technology Care Supply Chain Management Business Communications Health IT Term Motherboard Comparison Downtime Remote Computing FinTech Permissions Hosted Solution Scams IT Assessment Directions Assessment Typing Tablet User Hybrid Work Flexibility Value Organization Human Resources Specifications Alert Fraud File Sharing Digital Security Cameras Knowledge Dark Data Cables Smart Devices Microchip Internet Exlporer Google Drive Managed IT Memory Username IP Address How To Remote Working 5G Google Apps Data Breach Google Play Black Friday Notifications Unified Communications Travel Videos Experience IT Maintenance Electronic Health Records Database Google Docs Wasting Time Techology IT Technicians Bitcoin Google Maps Recovery Running Cable Business Intelligence Shortcuts Trend Micro Proxy Server Security Cameras Cookies Google Wallet Hard Drives Cyber Monday Domains Hotspot Unified Threat Management Ransmoware Software as a Service Tactics Managing Costs Unified Threat Management Mirgation Windows 8 Laptop Vendors Be Proactive eCommerce SSID Nanotechnology Drones Refrigeration Public Speaking Language Network Congestion Workforce Surveillance Virtual Assistant Addiction Virtual Machine Management User Error Lithium-ion battery Chatbots Halloween Threats Entrepreneur Reviews Workplace Strategies Medical IT Screen Reader Distributed Denial of Service Computing Infrastructure Point of Sale Meta Development Transportation Service Level Agreement Hypervisor Identity Hacks Scary Stories Amazon Tech Support Shopping Fun Optimization Bookmark PowerPoint Smart Tech Network Management Undo Alerts Deep Learning Monitors Outsource IT Employer/Employee Relationships Download Media Navigation Environment PCI DSS Websites Gig Economy Browsers Connectivity Break Fix Education Small Businesses Internet Service Provider Teamwork Upload Social Network SharePoint Evernote Mobile Computing Application Multi-Factor Security Electronic Medical Records Displays Regulations Compliance Search Memes IoT Dark Web Lenovo IBM Best Practice Writing Outsourcing Net Neutrality SQL Server Trends History Customer Resource management Regulations Google Calendar Buisness Virtual Reality Financial Data Private Cloud Smartwatch Workplace IT Data Analysis Star Wars Legal Server Management Microsoft Excel IT solutions Superfish Staff Business Growth Identity Theft Hiring/Firing Procurement Azure Gamification Paperless Cyber security Tech Social Networking Legislation Twitter Telework Error CES Cortana Co-managed IT Communitications Fileless Malware Competition

Blog Archive