Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office Vendor Networking Apple WiFi App Managed Services Employer-Employee Relationship Voice over Internet Protocol BYOD Tip of the week Mobile Device Management Chrome Budget Gmail How To BDR Conferencing Computing Information Technology Hacker Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications Bring Your Own Device Managed IT Services 2FA Help Desk Big Data Operating System Healthcare Physical Security Computers Virtual Private Network Risk Management Health Website Office Tips Analytics Augmented Reality Router Retail Storage Password Scam Data loss The Internet of Things Windows 11 Monitoring Social Excel Patch Management Going Green Save Money Remote Monitoring Remote Workers Vulnerability End of Support Vendor Management Cybercrime Telephone Customer Service Display Cooperation Free Resource Printer Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Document Management Solutions Firewall Processor Mouse Safety Mobile Security Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Settings Printing Customer Relationship Management Managed IT Service Wireless Content Filtering IT Management Downloads VPN YouTube Meetings iPhone Hacking Licensing Cryptocurrency Presentation Entertainment Vulnerabilities Data Privacy Computer Repair Wireless Technology Images 101 Virtual Desktop Data storage LiFi Telephone System Multi-Factor Authentication Mobility Cost Management Outlook Machine Learning Word Money Humor Employees Integration Maintenance User Tip Antivirus Modem Sports Social Engineering Database Surveillance Education Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Undo Remote Computing Media Proxy Server Reviews Mobile Computing Cookies Cyber Monday Medical IT Search Tactics Development Tablet Hotspot Transportation Small Businesses Best Practice Mirgation Hypervisor Displays Alert Shopping Managed IT Nanotechnology Optimization Buisness File Sharing PowerPoint Dark Data How To Legal Addiction IT solutions Language Employer/Employee Relationships Outsourcing Application Business Growth Chatbots Notifications Navigation Management PCI DSS Gig Economy Screen Reader IBM Travel Distributed Denial of Service Workplace Cortana Techology Service Level Agreement Internet Service Provider Google Maps Computing Infrastructure Teamwork Hiring/Firing Alt Codes Identity Evernote Paperless Regulations Compliance Bookmark Smart Tech Memes Downtime Unified Threat Management Co-managed IT Unified Threat Management Download Net Neutrality Hosted Solution Alerts SQL Server Technology Care Typing History Competition Business Communications Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Network Congestion Knowledge User Error Google Drive Upload Procurement Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES IoT Communitications Point of Sale Dark Web Cables User 5G Experience Google Docs Trends Supply Chain Management Unified Communications Customer Resource management FinTech Network Management Bitcoin Regulations Running Cable Tech Support Google Calendar Term Google Apps Data Analysis Google Wallet Star Wars IT Assessment IP Address Microsoft Excel IT Maintenance Monitors Staff Value Business Intelligence Gamification Flexibility Organization Windows 8 Social Networking Laptop Websites Legislation Shortcuts Fileless Malware Digital Security Cameras Drones Smart Devices Ransmoware Recovery Wearable Technology Memory Vendors Hard Drives Electronic Medical Records SharePoint Content Remote Working Health IT Motherboard Data Breach Domains Halloween Comparison Google Play Be Proactive Directions Videos Lenovo Assessment Electronic Health Records Permissions Workforce Writing Wasting Time Threats Refrigeration Virtual Reality Server Management Hacks Trend Micro Public Speaking Scary Stories Private Cloud Specifications Security Cameras Workplace Strategies Microchip Superfish Internet Exlporer Software as a Service Lithium-ion battery Identity Theft Fraud Meta Fun Deep Learning Managing Costs Amazon Twitter Entrepreneur Username eCommerce Error Black Friday SSID

Blog Archive