Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Cybersecurity Communication Managed Service Smartphone Data Backup Android Data Recovery Disaster Recovery Upgrade AI VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Information Holiday Facebook Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT Spam IT Support Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Virtualization Wi-Fi Business Technology Apps Two-factor Authentication Data Security Mobile Office Vendor Employer-Employee Relationship Managed Services Voice over Internet Protocol Chrome Networking Budget Mobile Device Management Apple BYOD Gmail App WiFi Tip of the week Conferencing Office 365 Hacker How To Avoiding Downtime BDR Marketing HIPAA Applications Access Control Computing Information Technology Retail Healthcare Computers Analytics Office Tips Augmented Reality Managed IT Services Website Storage Password Bring Your Own Device Router Virtual Private Network Operating System Big Data Health 2FA Help Desk Risk Management Document Management Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Physical Security Going Green Display The Internet of Things Printer Windows 11 Paperless Office Infrastructure Cybercrime Social Monitoring Excel Virtual Machines Professional Services Saving Time Customer Relationship Management Virtual Desktop Data storage Managed IT Service LiFi Maintenance Downloads Antivirus Hacking Presentation Outlook iPhone Licensing Money Wireless Technology Humor Vulnerabilities Entertainment Data Privacy Images 101 Sports Mouse Robot Mobility Telephone System Multi-Factor Authentication Cost Management Word Administration IT Management VPN Employees Meetings Integration Safety User Tip Modem Computer Repair Mobile Security Settings Processor Wireless Printing Content Filtering Holidays YouTube Data Storage Smart Technology Supply Chain Video Conferencing Cryptocurrency Machine Learning Managed Services Provider Screen Reader Google Docs Writing Distributed Denial of Service Workplace Unified Communications Experience Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Bitcoin Running Cable Evernote Paperless Server Management Regulations Compliance Private Cloud Identity Google Wallet Identity Theft Smart Tech Memes Competition Co-managed IT Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Windows 8 Laptop Business Communications Financial Data Error History Drones Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work User Halloween Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables CES Trends Supply Chain Management IP Address Alert Hacks Scary Stories Dark Data Google Calendar Term Google Apps Fun Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Deep Learning Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Recovery Legislation Shortcuts Education Organization Travel Social Networking Hard Drives Google Maps Smart Devices Domains Ransmoware Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Mobile Computing Comparison Google Play Be Proactive Search Health IT Unified Threat Management Motherboard Data Breach Refrigeration Assessment Electronic Health Records Public Speaking Permissions Workforce Best Practice Unified Threat Management Directions Videos Buisness Lithium-ion battery Wasting Time Threats Legal Network Congestion Specifications Security Cameras Workplace Strategies Entrepreneur IT solutions Trend Micro Internet Exlporer Software as a Service Fraud Meta Business Growth User Error Microchip Username Managing Costs Amazon Black Friday SSID Cortana Point of Sale eCommerce Undo Database Surveillance Virtual Assistant Outsource IT Alt Codes Downtime Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Hosted Solution Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Typing Websites Mirgation Hypervisor Displays Application Google Drive PowerPoint Knowledge Shopping Nanotechnology Optimization SharePoint Addiction IBM Electronic Medical Records Language Employer/Employee Relationships Outsourcing 5G Management PCI DSS Chatbots Navigation

Blog Archive