Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade AI Data Recovery Business Management VoIP Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Information Artificial Intelligence Facebook Miscellaneous Training Covid-19 Gadgets Cloud Computing Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Blockchain Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Managed Services Employer-Employee Relationship Voice over Internet Protocol BYOD Avoiding Downtime Marketing Access Control Office 365 HIPAA Applications WiFi How To BDR Conferencing Computing Hacker Information Technology Website Health Office Tips Analytics Router Augmented Reality Retail Storage Password Bring Your Own Device 2FA Managed IT Services Help Desk Big Data Healthcare Operating System Computers Virtual Private Network Risk Management Printer Windows 7 Paperless Office Microsoft 365 Infrastructure Solutions Firewall Document Management The Internet of Things Scam Windows 11 Data loss Monitoring Social Excel Going Green Patch Management Save Money Remote Workers Remote Monitoring Telephone Vulnerability End of Support Vendor Management Customer Service Cybercrime Physical Security Cooperation Free Resource Project Management Display Computer Repair Images 101 Telephone System Multi-Factor Authentication Mobility Virtual Desktop Cost Management Data storage LiFi Word Outlook Machine Learning Employees Money Humor Integration User Tip Modem Processor Safety Mobile Security Maintenance Antivirus Sports Holidays Mouse Data Storage Smart Technology Supply Chain Administration Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Customer Relationship Management Managed IT Service Settings Printing Downloads Wireless Content Filtering iPhone Hacking Licensing IT Management Presentation VPN YouTube Meetings Entertainment Vulnerabilities Data Privacy Cryptocurrency Wireless Technology Experience Data Analysis IP Address Star Wars IT Assessment Google Docs Microsoft Excel IT Maintenance Unified Communications Staff Value Business Intelligence Bitcoin Network Management Running Cable Tech Support Gamification Flexibility Organization Social Networking Google Wallet Legislation Shortcuts Monitors Fileless Malware Digital Security Cameras Smart Devices Recovery Ransmoware Hard Drives Wearable Technology Memory Vendors Windows 8 Laptop Websites Content Remote Working Health IT Domains Motherboard Data Breach Drones Comparison Google Play Be Proactive Electronic Medical Records Directions Videos Assessment Electronic Health Records SharePoint Permissions Workforce Refrigeration Wasting Time Threats Halloween Public Speaking Trend Micro Lenovo Specifications Security Cameras Workplace Strategies Writing Virtual Reality Microchip Lithium-ion battery Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Hacks Server Management Entrepreneur Scary Stories Private Cloud Username eCommerce Superfish Black Friday SSID Identity Theft Fun Twitter Database Surveillance Virtual Assistant Outsource IT Deep Learning Undo IT Technicians Virtual Machine Environment Media Error Proxy Server Reviews Cookies Cyber Monday Medical IT Education Social Engineering Hotspot Transportation Small Businesses Remote Computing Tactics Development Mirgation Hypervisor Displays Mobile Computing Search Shopping Nanotechnology Optimization PowerPoint Tablet Application Language Employer/Employee Relationships Outsourcing Best Practice Alert Addiction Management PCI DSS Chatbots Managed IT Navigation Buisness File Sharing Dark Data How To Gig Economy IBM Screen Reader Legal Distributed Denial of Service Workplace IT solutions Computing Infrastructure Teamwork Hiring/Firing Business Growth Notifications Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Travel Cortana Bookmark Smart Tech Memes Techology Co-managed IT Google Maps Alerts SQL Server Technology Care Alt Codes Download Net Neutrality Financial Data Competition History Business Communications Downtime Unified Threat Management Browsers Smartwatch Connectivity IT Unified Threat Management Break Fix Scams Hosted Solution Azure Hybrid Work Typing Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Network Congestion Knowledge CES IoT Communitications Google Drive User Error User Dark Web Cables Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Point of Sale 5G

Blog Archive