Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Managed Service Smartphone Android Upgrade VoIP Business Management AI Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Information Automation Facebook Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Employee/Employer Relationship Encryption IT Support Spam Office Windows 10 Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Virtualization Bandwidth Blockchain Vendor Mobile Office Two-factor Authentication Data Security Apps Apple BYOD App Mobile Device Management Managed Services Voice over Internet Protocol Tip of the week Gmail Networking Chrome Employer-Employee Relationship Budget Hacker HIPAA Avoiding Downtime Applications Marketing Access Control Computing Information Technology Conferencing WiFi Office 365 How To BDR Computers Router Virtual Private Network Website Health Operating System Help Desk Healthcare Risk Management Retail Big Data Analytics Office Tips Managed IT Services Augmented Reality Storage Password 2FA Bring Your Own Device Vendor Management Excel Physical Security Display Going Green Printer Paperless Office Infrastructure Cybercrime Remote Workers Firewall Monitoring Document Management The Internet of Things Free Resource Project Management Windows 7 Scam Data loss Telephone Social Microsoft 365 Solutions Cooperation Patch Management Windows 11 Save Money Remote Monitoring Customer Service Vulnerability End of Support Presentation IT Management Administration VPN Holidays Meetings Wireless Technology Data Storage Computer Repair Video Conferencing Managed Services Provider User Tip Modem Settings Mobile Security Virtual Machines Processor Professional Services Printing Word Wireless Content Filtering YouTube Data Privacy Smart Technology Machine Learning Cryptocurrency iPhone Safety Saving Time Vulnerabilities Maintenance Virtual Desktop Managed IT Service Antivirus Data storage LiFi Images 101 Downloads Outlook Multi-Factor Authentication Mobility Licensing Money Humor Entertainment Customer Relationship Management Employees Robot Integration Sports Mouse Telephone System Cost Management Supply Chain Hacking Virtual Assistant Content Wearable Technology Unified Threat Management Outsourcing Surveillance Mobile Computing Comparison Virtual Machine User Health IT Search Motherboard Assessment Permissions Reviews Workplace Best Practice Directions Medical IT Network Congestion Transportation Buisness User Error Hiring/Firing Development Specifications IP Address Paperless Legal Hypervisor IT solutions Internet Exlporer Fraud Shopping Co-managed IT Optimization Point of Sale Business Growth Microchip PowerPoint Employer/Employee Relationships Username Technology Care Black Friday PCI DSS Network Management Business Communications Tech Support Recovery Navigation Cortana Database Gig Economy Scams Hard Drives Alt Codes Monitors Teamwork Downtime IT Technicians Hybrid Work Internet Service Provider Domains Cyber Monday Regulations Compliance Human Resources Websites Hosted Solution Proxy Server Evernote Cookies Tactics Hotspot Cables Memes Refrigeration Typing Public Speaking SQL Server Electronic Medical Records Mirgation SharePoint Net Neutrality Financial Data Lithium-ion battery Google Apps Google Drive History Knowledge Nanotechnology Entrepreneur Addiction Language Smartwatch Lenovo IT Maintenance IT Writing Azure Virtual Reality Management 5G Chatbots Business Intelligence Procurement Distributed Denial of Service Telework Server Management Shortcuts Google Docs Cyber security Private Cloud Unified Communications Tech Experience Screen Reader Running Cable Service Level Agreement Computing Infrastructure CES Superfish Ransmoware Communitications Identity Theft Undo Bitcoin Supply Chain Management Google Wallet Twitter Identity Vendors FinTech Be Proactive Error Bookmark Term Smart Tech Social Engineering Laptop Download Alerts Workforce IT Assessment Windows 8 Flexibility Drones Value Remote Computing Threats Break Fix Organization Workplace Strategies Application Browsers Connectivity Halloween Upload Digital Security Cameras Meta Smart Devices Tablet Remote Working IBM Memory Alert Social Network Amazon Multi-Factor Security Dark Web Managed IT Data Breach File Sharing Google Play Dark Data IoT How To Scary Stories Trends Videos Outsource IT Electronic Health Records Hacks Media Wasting Time Notifications Customer Resource management Fun Regulations Environment Google Calendar Microsoft Excel Trend Micro Travel Deep Learning Data Analysis Security Cameras Star Wars Gamification Staff Techology Small Businesses Software as a Service Google Maps Competition Managing Costs Education Social Networking Displays Legislation eCommerce Unified Threat Management Fileless Malware SSID

Blog Archive