Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Managed Service Data Backup Android Upgrade AI VoIP Business Management Smartphones Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Government Data Management Windows 10 Virtualization Business Technology Wi-Fi Blockchain Bandwidth Vendor Apps Two-factor Authentication Mobile Office Data Security Gmail BYOD Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget HIPAA Applications WiFi Access Control Computing Conferencing Information Technology Hacker Avoiding Downtime Office 365 How To Marketing BDR Storage Password Bring Your Own Device Router Virtual Private Network Big Data Health Help Desk Operating System Retail Risk Management Computers Healthcare Managed IT Services Analytics Website Office Tips Augmented Reality 2FA Remote Monitoring Firewall End of Support Vulnerability Vendor Management Solutions Physical Security The Internet of Things Display Printer Going Green Paperless Office Social Infrastructure Monitoring Cybercrime Document Management Customer Service Remote Workers Telephone Scam Data loss Windows 11 Cooperation Free Resource Project Management Windows 7 Patch Management Excel Save Money Microsoft 365 Sports Mouse IT Management Safety VPN Employees Meetings Integration Administration User Tip Modem Computer Repair Mobile Security Processor Data Privacy Holidays Settings Data Storage Smart Technology Printing Wireless Content Filtering Video Conferencing Customer Relationship Management Machine Learning Managed Services Provider Professional Services YouTube Saving Time Virtual Machines Cryptocurrency Managed IT Service Hacking Presentation Maintenance Antivirus Downloads iPhone Virtual Desktop LiFi Wireless Technology Licensing Data storage Vulnerabilities Entertainment Outlook Money Images 101 Word Supply Chain Humor Robot Mobility Telephone System Multi-Factor Authentication Cost Management Deep Learning Public Speaking Content Remote Working Workplace Wearable Technology Memory Comparison Google Play Lithium-ion battery Health IT Hiring/Firing Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Entrepreneur Paperless Permissions Education Unified Threat Management Directions Videos Co-managed IT Wasting Time Network Congestion Specifications Security Cameras Mobile Computing Technology Care Trend Micro Search Internet Exlporer Software as a Service Business Communications Fraud User Error Microchip Undo Best Practice Username Scams Managing Costs Black Friday SSID Buisness Hybrid Work Point of Sale eCommerce Database Surveillance Human Resources Virtual Assistant Legal IT solutions Business Growth Network Management Cables Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Proxy Server Reviews Application Cookies Cortana Tactics Development Google Apps Hotspot Transportation Alt Codes IBM IT Maintenance Websites Mirgation Hypervisor PowerPoint Downtime Shopping Business Intelligence Nanotechnology Optimization Addiction Shortcuts Electronic Medical Records Language Employer/Employee Relationships Hosted Solution SharePoint Typing Management PCI DSS Ransmoware Chatbots Navigation Writing Distributed Denial of Service Lenovo Gig Economy Vendors Screen Reader Competition Knowledge Service Level Agreement Internet Service Provider Be Proactive Virtual Reality Computing Infrastructure Teamwork Google Drive Server Management Regulations Compliance Workforce Private Cloud Identity Evernote Superfish Bookmark Threats 5G Identity Theft Smart Tech Memes Experience Download Net Neutrality Workplace Strategies Twitter Alerts SQL Server Google Docs Unified Communications Bitcoin Running Cable Financial Data User Meta Error History Connectivity IT Social Engineering Break Fix Google Wallet Browsers Smartwatch Amazon Upload Procurement Remote Computing Azure Multi-Factor Security Tech Windows 8 IP Address Laptop Social Network Telework Outsource IT Cyber security Tablet IoT Communitications Media Dark Web Drones CES Environment Trends Supply Chain Management Alert Dark Data Google Calendar Term Halloween Managed IT Customer Resource management FinTech Recovery Small Businesses File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel Data Analysis Hard Drives Displays Domains Gamification Flexibility Notifications Staff Value Legislation Hacks Scary Stories Organization Outsourcing Travel Social Networking Fun Google Maps Smart Devices Techology Fileless Malware Digital Security Cameras Refrigeration

Blog Archive