Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Android Disaster Recovery Upgrade Data Recovery Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Holiday Automation Information Cloud Computing Gadgets Training Covid-19 Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Bandwidth Virtualization Business Technology Wi-Fi Blockchain Windows 10 Vendor Data Security Apps Mobile Office Two-factor Authentication Gmail Managed Services Voice over Internet Protocol Chrome Budget WiFi BYOD Apple Employer-Employee Relationship App Tip of the week Mobile Device Management Networking How To Applications BDR Conferencing Access Control Hacker Computing Avoiding Downtime Information Technology Marketing HIPAA Office 365 Office Tips Router Analytics Augmented Reality Healthcare Storage Password Big Data Help Desk Bring Your Own Device Virtual Private Network Health Computers 2FA Operating System Website Risk Management Retail Managed IT Services Remote Workers Patch Management The Internet of Things Save Money Remote Monitoring Vulnerability End of Support Monitoring Free Resource Vendor Management Social Project Management Windows 7 Physical Security Microsoft 365 Display Printer Going Green Customer Service Paperless Office Solutions Telephone Infrastructure Windows 11 Cybercrime Cooperation Document Management Excel Scam Data loss Firewall Outlook Money Safety Data Privacy User Tip Humor Modem Mobile Security iPhone Robot Processor Sports Vulnerabilities Mouse Smart Technology IT Management Images 101 VPN Meetings Administration Multi-Factor Authentication Mobility Saving Time Customer Relationship Management Computer Repair Managed IT Service Hacking Downloads Presentation Settings Employees Printing Licensing Integration Wireless Content Filtering Wireless Technology Machine Learning Supply Chain Entertainment YouTube Cryptocurrency Holidays Telephone System Data Storage Maintenance Cost Management Antivirus Word Video Conferencing Virtual Desktop Data storage LiFi Managed Services Provider Virtual Machines Professional Services Specifications Alert Entrepreneur Evernote Human Resources Regulations Compliance Internet Exlporer Managed IT Memes Fraud Halloween File Sharing Dark Data Cables Microchip Username Net Neutrality SQL Server How To History Black Friday Notifications Google Apps Financial Data Undo Smartwatch Database Hacks IT Scary Stories Travel IT Maintenance Techology Procurement IT Technicians Google Maps Azure Fun Business Intelligence Cyber security Cyber Monday Tech Shortcuts Proxy Server Telework Cookies Deep Learning CES Tactics Communitications Hotspot Unified Threat Management Ransmoware Unified Threat Management Supply Chain Management Mirgation Education Application Vendors Term Be Proactive FinTech Nanotechnology Addiction Mobile Computing IBM IT Assessment Language Network Congestion Workforce Management User Error Flexibility Chatbots Value Search Threats Distributed Denial of Service Workplace Strategies Organization Screen Reader Best Practice Digital Security Cameras Service Level Agreement Smart Devices Computing Infrastructure Buisness Point of Sale Meta Legal Remote Working Identity IT solutions Memory Amazon Competition Data Breach Tech Support Google Play Bookmark Smart Tech Business Growth Network Management Videos Download Electronic Health Records Alerts Monitors Outsource IT Environment Media Wasting Time Cortana Trend Micro Break Fix Websites Security Cameras Browsers Connectivity Alt Codes Upload Software as a Service Downtime User Small Businesses Displays Social Network SharePoint Hosted Solution Managing Costs Multi-Factor Security Electronic Medical Records Typing eCommerce Dark Web SSID IoT Trends Lenovo IP Address Surveillance Virtual Assistant Writing Outsourcing Knowledge Virtual Reality Customer Resource management Google Drive Regulations Virtual Machine Google Calendar Server Management Microsoft Excel Private Cloud Medical IT Workplace Data Analysis Reviews Star Wars Gamification Superfish Development Staff Identity Theft Recovery Transportation 5G Hiring/Firing Experience Twitter Paperless Google Docs Social Networking Unified Communications Hard Drives Hypervisor Legislation Bitcoin Domains Optimization Running Cable Error PowerPoint Co-managed IT Fileless Malware Shopping Content Google Wallet Wearable Technology Employer/Employee Relationships Social Engineering Technology Care Comparison Remote Computing Navigation Business Communications Health IT PCI DSS Motherboard Refrigeration Assessment Windows 8 Public Speaking Permissions Laptop Scams Directions Gig Economy Drones Lithium-ion battery Internet Service Provider Tablet Teamwork Hybrid Work

Blog Archive