Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Compliance Managed Service Provider Remote Work Outsourced IT Server IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Data Security Vendor Two-factor Authentication Apps Managed Services Mobile Office Mobile Device Management App Gmail BYOD WiFi Employer-Employee Relationship Tip of the week Voice over Internet Protocol Chrome Budget Networking Apple BDR HIPAA Physical Security Computing Applications Information Technology Access Control Office 365 Conferencing Hacker Avoiding Downtime Managed IT Services How To Marketing Operating System Router Virtual Private Network 2FA Big Data Risk Management Health Help Desk Office Tips Analytics Healthcare Augmented Reality Retail Computers Storage Password Bring Your Own Device Website Patch Management Solutions Save Money Going Green Firewall Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime The Internet of Things Windows 11 Display Printer Social Paperless Office Excel Infrastructure Monitoring Remote Workers Document Management Customer Service Managed IT Service Telephone Scam Free Resource Project Management Data loss Windows 7 Cooperation Microsoft 365 Word Telephone System Robot Cost Management Employees Integration Settings Printing Wireless IT Management VPN Meetings Safety Content Filtering Holidays YouTube User Tip Modem Processor Data Storage Cryptocurrency Mobile Security Computer Repair Supply Chain Video Conferencing Managed Services Provider Virtual Machines Virtual Desktop Professional Services Data storage LiFi Smart Technology Machine Learning Customer Relationship Management Saving Time Outlook Money iPhone Humor Hacking Presentation Maintenance Antivirus Downloads Vulnerabilities Data Privacy Licensing Wireless Technology Sports Images 101 Mouse Entertainment Multi-Factor Authentication Mobility Administration Data Analysis Star Wars Remote Working Best Practice Microsoft Excel How To Hard Drives Memory Vendors Staff Notifications Domains Data Breach Buisness Google Play Be Proactive Gamification Videos Legal Social Networking Travel Electronic Health Records IT solutions Legislation Workforce Techology Fileless Malware Google Maps Business Growth Refrigeration Wasting Time Threats Wearable Technology Public Speaking Trend Micro Security Cameras Workplace Strategies Content Health IT Motherboard Unified Threat Management Lithium-ion battery Software as a Service Comparison Meta Cortana Managing Costs Amazon Entrepreneur Unified Threat Management Directions Assessment Alt Codes Permissions eCommerce Downtime SSID Surveillance Hosted Solution Specifications Network Congestion Virtual Assistant Outsource IT Undo Virtual Machine Environment Media User Error Microchip Internet Exlporer Typing Fraud Reviews Medical IT Username Google Drive Point of Sale Development Black Friday Transportation Small Businesses Knowledge Hypervisor Displays Database Network Management Shopping IT Technicians Tech Support Optimization PowerPoint 5G Proxy Server Google Docs Cookies Unified Communications Cyber Monday Monitors Application Employer/Employee Relationships Outsourcing Experience Hotspot Running Cable Navigation Tactics PCI DSS Bitcoin Gig Economy Google Wallet Mirgation Websites IBM Workplace Nanotechnology Internet Service Provider Teamwork Hiring/Firing Windows 8 Language Electronic Medical Records Laptop Evernote Paperless SharePoint Addiction Regulations Compliance Management Drones Chatbots Memes Co-managed IT Lenovo Screen Reader Net Neutrality Distributed Denial of Service Writing SQL Server Technology Care Computing Infrastructure Virtual Reality Competition History Halloween Business Communications Service Level Agreement Financial Data Server Management Smartwatch Identity Private Cloud IT Scams Superfish Bookmark Smart Tech Identity Theft Procurement Azure Hybrid Work Hacks Alerts Twitter Cyber security Scary Stories Tech Human Resources Download Telework CES Error Communitications User Cables Fun Browsers Connectivity Supply Chain Management Deep Learning Break Fix Social Engineering Remote Computing Term Google Apps Upload FinTech Social Network IP Address IT Assessment Education Multi-Factor Security IT Maintenance IoT Tablet Flexibility Dark Web Value Business Intelligence Mobile Computing Alert Shortcuts Trends Organization Managed IT Customer Resource management Digital Security Cameras Regulations File Sharing Smart Devices Google Calendar Dark Data Recovery Ransmoware Search

Blog Archive