Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Ransomware Users Managed Service AI Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Artificial Intelligence Facebook Holiday Automation Compliance Gadgets Cloud Computing Training Covid-19 Managed Service Provider Outsourced IT Server Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Vendor Business Technology Managed Services Data Security Apps Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Gmail Apple Networking WiFi Voice over Internet Protocol App Employer-Employee Relationship BYOD Tip of the week Password Managed IT Services How To Conferencing BDR Computing Physical Security Information Technology Hacker HIPAA Access Control Avoiding Downtime Office 365 Applications Marketing Augmented Reality Retail 2FA Storage Help Desk Bring Your Own Device Healthcare Big Data Operating System Virtual Private Network Risk Management Computers Health Router Analytics Website Office Tips Document Management Windows 11 Monitoring Firewall Scam Excel Data loss The Internet of Things Remote Workers Managed IT Service Telephone Social Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cooperation Free Resource Cybercrime Project Management Windows 7 Customer Service Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Money Processor Mobile Security Humor Word Holidays Maintenance Data Storage Sports Smart Technology Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Safety Saving Time Virtual Machines Professional Services Administration Downloads Robot iPhone Licensing Settings Printing Entertainment Wireless Vulnerabilities Content Filtering Data Privacy IT Management Customer Relationship Management VPN Images 101 YouTube Meetings Telephone System Multi-Factor Authentication Mobility Cryptocurrency Hacking Cost Management Presentation Computer Repair Virtual Desktop Data storage LiFi Wireless Technology Employees Integration Outlook User Tip Machine Learning Modem Lenovo Hard Drives Database Surveillance Writing Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Domains Virtual Reality Proxy Server Reviews Scary Stories Private Cloud Cookies Cyber Monday Medical IT Hacks Server Management Superfish Identity Theft Refrigeration Tactics Development Fun Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Deep Learning Public Speaking Twitter Shopping Error Nanotechnology Optimization PowerPoint Lithium-ion battery Education Addiction Social Engineering Entrepreneur Language Employer/Employee Relationships Outsourcing Chatbots Navigation Management PCI DSS Remote Computing Gig Economy Screen Reader Distributed Denial of Service Workplace Mobile Computing Tablet Undo Service Level Agreement Internet Service Provider Search Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Best Practice Regulations Compliance Alert Bookmark Buisness File Sharing Smart Tech Memes Dark Data Co-managed IT Managed IT Legal IT solutions Download Net Neutrality How To Alerts SQL Server Technology Care History Business Communications Business Growth Financial Data Notifications Browsers Smartwatch Travel Application Connectivity IT Break Fix Scams Techology Google Maps Upload Procurement Cortana Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Alt Codes IBM Social Network Telework CES Downtime Unified Threat Management IoT Communitications Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Typing Data Analysis Star Wars IT Assessment Network Congestion Microsoft Excel IT Maintenance Staff Value Business Intelligence Google Drive User Error Competition Gamification Flexibility Knowledge Organization Social Networking Legislation Shortcuts Fileless Malware Digital Security Cameras Point of Sale Smart Devices 5G Ransmoware Wearable Technology Memory Vendors Google Docs Unified Communications Content Remote Working Experience Health IT Running Cable Tech Support User Motherboard Data Breach Comparison Google Play Be Proactive Bitcoin Network Management Google Wallet Directions Videos Assessment Electronic Health Records Monitors Permissions Workforce Wasting Time Threats Laptop Websites Trend Micro Specifications Security Cameras Workplace Strategies Windows 8 IP Address Drones Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon SharePoint Username Electronic Medical Records Halloween Recovery eCommerce Black Friday SSID

Blog Archive