Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade VoIP AI Business Management Smartphones communications Data Recovery Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Facebook Artificial Intelligence Information Cloud Computing Holiday Covid-19 Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Government Data Management Business Continuity Windows 10 Business Technology Wi-Fi Virtualization Blockchain Bandwidth Mobile Office Two-factor Authentication Apps Data Security Vendor Apple BYOD App Mobile Device Management Gmail Tip of the week Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Chrome Budget Avoiding Downtime Marketing Conferencing Access Control Computing Information Technology WiFi Office 365 How To HIPAA BDR Applications Hacker Bring Your Own Device Website Help Desk Virtual Private Network Health Operating System 2FA Risk Management Retail Big Data Analytics Office Tips Managed IT Services Healthcare Augmented Reality Router Storage Computers Password Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Microsoft 365 Monitoring Physical Security Solutions Display Printer Going Green Windows 11 Firewall Paperless Office Infrastructure Telephone Cybercrime Excel The Internet of Things Document Management Cooperation Social Scam Data loss Remote Workers Customer Service Patch Management Free Resource Save Money Project Management Images 101 Mouse Processor Mobile Security Wireless Technology Multi-Factor Authentication Mobility IT Management Administration VPN Meetings Smart Technology Word Saving Time Computer Repair Employees Integration Settings Wireless Managed IT Service Printing Content Filtering Downloads Supply Chain Holidays YouTube Safety Machine Learning Licensing Data Storage Cryptocurrency Entertainment Video Conferencing Managed Services Provider Maintenance Virtual Machines Virtual Desktop Professional Services Data storage Antivirus LiFi Telephone System Cost Management Outlook Customer Relationship Management Data Privacy Money iPhone Humor Hacking Vulnerabilities Presentation Robot Sports Modem User Tip Vendors IT Assessment Education Database Flexibility Be Proactive Unified Threat Management Value IT Technicians Cookies Cyber Monday IP Address Unified Threat Management Organization Workforce Mobile Computing Proxy Server Digital Security Cameras Threats Smart Devices Tactics Search Hotspot Network Congestion Remote Working Workplace Strategies Best Practice Memory Mirgation Data Breach Buisness Nanotechnology Google Play User Error Meta Recovery Videos Amazon Legal Hard Drives Electronic Health Records IT solutions Addiction Language Domains Business Growth Management Point of Sale Wasting Time Chatbots Trend Micro Screen Reader Security Cameras Distributed Denial of Service Outsource IT Environment Refrigeration Network Management Software as a Service Media Service Level Agreement Tech Support Cortana Computing Infrastructure Identity Monitors Public Speaking Alt Codes Managing Costs Bookmark eCommerce Downtime Smart Tech SSID Lithium-ion battery Small Businesses Displays Surveillance Hosted Solution Entrepreneur Download Websites Virtual Assistant Alerts Typing Virtual Machine Browsers Connectivity Electronic Medical Records Medical IT Break Fix SharePoint Reviews Outsourcing Google Drive Undo Development Upload Transportation Knowledge Writing Multi-Factor Security Lenovo Workplace Social Network Hypervisor Hiring/Firing Optimization IoT Virtual Reality PowerPoint 5G Dark Web Shopping Google Docs Server Management Paperless Unified Communications Trends Private Cloud Employer/Employee Relationships Experience Running Cable Regulations Navigation Google Calendar Superfish PCI DSS Co-managed IT Bitcoin Customer Resource management Identity Theft Technology Care Google Wallet Application Data Analysis Star Wars Twitter Microsoft Excel Gig Economy Internet Service Provider Business Communications Gamification Error Teamwork Staff Laptop Social Networking Social Engineering Evernote Legislation IBM Regulations Compliance Scams Windows 8 Hybrid Work Drones Fileless Malware Memes Remote Computing Net Neutrality Human Resources Content SQL Server Wearable Technology Halloween Motherboard Comparison Financial Data Cables Health IT Tablet History Directions IT Assessment Alert Permissions Smartwatch Competition Managed IT Procurement Google Apps File Sharing Azure Dark Data Scary Stories How To Tech Specifications Telework IT Maintenance Hacks Cyber security Business Intelligence Microchip Communitications Internet Exlporer Notifications Fun Fraud CES Supply Chain Management Shortcuts Deep Learning Username Travel Term Black Friday Techology FinTech Ransmoware User Google Maps

Blog Archive