Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Disaster Recovery AI Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services 2FA Operating System Computers Router Physical Security Virtual Private Network Risk Management Website Health Healthcare Help Desk Firewall Document Management Free Resource Project Management Windows 7 Telephone Microsoft 365 The Internet of Things Scam Data loss Solutions Social Cooperation Going Green Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Excel Display Printer Remote Workers Paperless Office Infrastructure Monitoring Outlook Machine Learning Vulnerabilities Money Saving Time Data Privacy Humor Images 101 Managed IT Service Mobility Safety Maintenance Multi-Factor Authentication Antivirus Sports Downloads Mouse Licensing Entertainment Administration Employees Integration Telephone System Robot Customer Relationship Management Cost Management Holidays Settings Printing Wireless Data Storage Content Filtering Hacking IT Management Supply Chain Presentation VPN Video Conferencing YouTube Meetings Managed Services Provider Cryptocurrency Virtual Machines Professional Services Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi iPhone Word Smart Technology Electronic Medical Records Language Tech Human Resources SharePoint Telework Addiction Cyber security Refrigeration Management Communitications Halloween Chatbots Cables CES Public Speaking Lenovo Supply Chain Management Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Term Google Apps Lithium-ion battery FinTech Service Level Agreement Hacks Server Management IT Assessment Entrepreneur Scary Stories Private Cloud Identity IT Maintenance Superfish Bookmark Flexibility Identity Theft Smart Tech Value Business Intelligence Fun Twitter Alerts Shortcuts Organization Deep Learning Download Undo Smart Devices Error Ransmoware Digital Security Cameras Browsers Remote Working Education Connectivity Memory Vendors Social Engineering Break Fix Remote Computing Google Play Be Proactive Upload Data Breach Mobile Computing Social Network Electronic Health Records Workforce Multi-Factor Security Videos Tablet IoT Wasting Time Threats Search Dark Web Alert Security Cameras Workplace Strategies Application Best Practice Trends Trend Micro Managed IT Customer Resource management Software as a Service Buisness File Sharing Regulations Meta Dark Data Google Calendar IBM Legal Data Analysis IT solutions Star Wars Managing Costs Amazon How To Microsoft Excel eCommerce Notifications Staff SSID Business Growth Gamification Surveillance Travel Social Networking Virtual Assistant Outsource IT Legislation Media Techology Fileless Malware Google Maps Virtual Machine Environment Cortana Wearable Technology Medical IT Reviews Alt Codes Content Competition Health IT Development Downtime Unified Threat Management Motherboard Transportation Small Businesses Comparison Unified Threat Management Directions Hosted Solution Assessment Hypervisor Displays Permissions Typing Optimization PowerPoint Shopping Employer/Employee Relationships Outsourcing Network Congestion Specifications Knowledge Fraud Navigation Google Drive User Error Microchip PCI DSS User Internet Exlporer Username Workplace Gig Economy Internet Service Provider Point of Sale Teamwork Hiring/Firing 5G Black Friday Experience Evernote Paperless IP Address Google Docs Regulations Compliance Unified Communications Database Bitcoin Network Management Memes Running Cable Tech Support IT Technicians Co-managed IT Google Wallet Proxy Server Net Neutrality Cookies SQL Server Technology Care Monitors Cyber Monday Hotspot Business Communications Financial Data Recovery Tactics History Hard Drives Windows 8 IT Laptop Websites Mirgation Scams Smartwatch Domains Drones Procurement Nanotechnology Azure Hybrid Work

Blog Archive