Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Compliance Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Voice over Internet Protocol Apple Networking WiFi BDR Computing Physical Security HIPAA Information Technology Hacker Applications Access Control Avoiding Downtime Office 365 Marketing Conferencing Managed IT Services How To Big Data Operating System Risk Management Virtual Private Network Router Computers Health Analytics Website Office Tips Augmented Reality 2FA Help Desk Retail Storage Password Bring Your Own Device Healthcare Cooperation Free Resource Social Going Green Patch Management Project Management Save Money Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Cybercrime Microsoft 365 Customer Service Solutions Display Printer Paperless Office Infrastructure Windows 11 Document Management Monitoring Excel Firewall Scam Remote Workers Data loss Managed IT Service Telephone The Internet of Things Entertainment Vulnerabilities Data Privacy Robot Images 101 Settings Wireless Printing Telephone System Multi-Factor Authentication Content Filtering Mobility IT Management Cost Management Customer Relationship Management YouTube Meetings VPN Cryptocurrency Hacking Employees Presentation Computer Repair Integration Virtual Desktop Data storage User Tip LiFi Modem Wireless Technology Processor Mobile Security Outlook Holidays Machine Learning Money Data Storage Humor Smart Technology Supply Chain Word Video Conferencing Managed Services Provider Saving Time Maintenance Virtual Machines Professional Services Antivirus Sports Mouse Safety Administration Downloads iPhone Licensing Legal Social Network Telework IT solutions Cyber security How To Multi-Factor Security Tech Human Resources CES Business Growth IoT Communitications Notifications Dark Web Cables Travel Application Trends Supply Chain Management Techology Customer Resource management FinTech Google Maps Regulations Cortana Google Calendar Term Google Apps Data Analysis Alt Codes Star Wars IT Assessment IBM Microsoft Excel IT Maintenance Downtime Unified Threat Management Staff Value Business Intelligence Gamification Flexibility Unified Threat Management Organization Hosted Solution Social Networking Legislation Shortcuts Fileless Malware Digital Security Cameras Typing Smart Devices Ransmoware Wearable Technology Memory Vendors Network Congestion Content Remote Working Google Drive User Error Health IT Motherboard Data Breach Competition Knowledge Comparison Google Play Be Proactive Directions Videos Assessment Electronic Health Records Permissions Workforce Point of Sale Wasting Time Threats 5G Google Docs Unified Communications Trend Micro Experience Specifications Security Cameras Workplace Strategies Microchip Bitcoin Network Management Internet Exlporer Software as a Service Running Cable Tech Support Fraud Meta User Managing Costs Amazon Monitors Google Wallet Username eCommerce Black Friday SSID Windows 8 Database Surveillance IP Address Laptop Websites Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Drones SharePoint Proxy Server Reviews Cookies Electronic Medical Records Cyber Monday Medical IT Recovery Tactics Development Halloween Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Hard Drives Writing Lenovo Shopping Nanotechnology Optimization Domains Virtual Reality PowerPoint Hacks Server Management Addiction Scary Stories Private Cloud Language Employer/Employee Relationships Outsourcing Management PCI DSS Identity Theft Chatbots Refrigeration Fun Navigation Superfish Gig Economy Deep Learning Screen Reader Public Speaking Twitter Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Lithium-ion battery Error Regulations Compliance Education Identity Social Engineering Evernote Paperless Entrepreneur Bookmark Smart Tech Memes Remote Computing Co-managed IT Alerts SQL Server Technology Care Mobile Computing Download Net Neutrality Financial Data Tablet History Undo Search Business Communications Browsers Smartwatch Best Practice Connectivity IT Alert Break Fix Scams Buisness File Sharing Azure Hybrid Work Dark Data Managed IT Upload Procurement

Blog Archive