Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Cloud Computing Gadgets Covid-19 Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Bandwidth Virtualization Blockchain Business Technology Wi-Fi Data Security Vendor Apps Mobile Office Two-factor Authentication Networking Gmail Chrome Budget WiFi BYOD Apple Employer-Employee Relationship App Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Office 365 How To BDR HIPAA Applications Access Control Hacker Computing Avoiding Downtime Information Technology Marketing Conferencing Managed IT Services Analytics Office Tips Augmented Reality Storage 2FA Big Data Password Bring Your Own Device Router Virtual Private Network Health Computers Operating System Help Desk Website Retail Risk Management Healthcare Firewall Cooperation Free Resource Project Management Windows 11 The Internet of Things Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Vendor Management Social Excel Solutions Physical Security Display Printer Going Green Customer Service Paperless Office Infrastructure Monitoring Cybercrime Document Management Remote Workers Scam Telephone Data loss iPhone Licensing Outlook Entertainment Vulnerabilities Money Safety Humor Robot Images 101 Telephone System Multi-Factor Authentication Mobility Supply Chain Sports Cost Management Mouse IT Management VPN Meetings Administration Employees Integration Customer Relationship Management Computer Repair User Tip Modem Mobile Security Processor Hacking Settings Holidays Presentation Printing Wireless Data Storage Data Privacy Content Filtering Machine Learning Smart Technology Wireless Technology YouTube Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Cryptocurrency Maintenance Word Antivirus Managed IT Service Virtual Desktop Data storage Downloads LiFi Public Speaking Laptop Browsers Smartwatch Connectivity IT Break Fix Windows 8 Workplace Strategies Tablet Azure Drones Meta Lithium-ion battery Upload Procurement Entrepreneur Social Network Telework Cyber security Amazon Alert Multi-Factor Security Tech Dark Data Halloween CES Managed IT IoT Communitications File Sharing Dark Web Outsource IT How To Trends Supply Chain Management Customer Resource management FinTech Regulations Environment Notifications Google Calendar Term Media Undo Scary Stories Data Analysis Star Wars IT Assessment Travel Microsoft Excel Hacks Google Maps Staff Value Small Businesses Fun Techology Gamification Flexibility Organization Social Networking Displays Legislation Deep Learning Fileless Malware Digital Security Cameras Smart Devices Unified Threat Management Wearable Technology Memory Outsourcing Education Application Unified Threat Management Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Mobile Computing Workplace IBM Network Congestion Directions Videos Assessment Electronic Health Records Permissions Wasting Time Hiring/Firing Search User Error Trend Micro Specifications Security Cameras Best Practice Paperless Fraud Co-managed IT Buisness Microchip Internet Exlporer Software as a Service Point of Sale Username Managing Costs Legal Technology Care IT solutions Network Management eCommerce Tech Support Black Friday SSID Business Growth Business Communications Competition Virtual Assistant Scams Monitors Database Surveillance IT Technicians Virtual Machine Hybrid Work Cortana Proxy Server Reviews Cookies Websites Cyber Monday Medical IT Alt Codes Human Resources Hotspot Transportation Cables Downtime User Tactics Development Mirgation Hypervisor Electronic Medical Records Hosted Solution SharePoint Shopping Nanotechnology Optimization PowerPoint Typing Google Apps Language Employer/Employee Relationships IT Maintenance IP Address Writing Lenovo Addiction Management PCI DSS Chatbots Google Drive Business Intelligence Virtual Reality Navigation Knowledge Gig Economy Server Management Screen Reader Private Cloud Distributed Denial of Service Shortcuts Identity Theft Computing Infrastructure Teamwork Ransmoware Recovery 5G Superfish Service Level Agreement Internet Service Provider Regulations Compliance Identity Google Docs Vendors Twitter Evernote Unified Communications Hard Drives Experience Running Cable Bookmark Smart Tech Memes Error Bitcoin Be Proactive Domains Alerts SQL Server Google Wallet Workforce Social Engineering Download Net Neutrality Financial Data History Threats Remote Computing Refrigeration

Blog Archive