Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Facebook Holiday Miscellaneous Automation Information Cloud Computing Training Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Bandwidth Virtualization Blockchain Business Technology Vendor Mobile Office Data Security Two-factor Authentication Apps App Networking Managed Services Mobile Device Management Voice over Internet Protocol Gmail BYOD Chrome Budget WiFi Apple Employer-Employee Relationship Tip of the week Applications Hacker Computing Avoiding Downtime How To Information Technology Marketing BDR Conferencing Office 365 Access Control HIPAA Router Retail Computers Operating System 2FA Help Desk Managed IT Services Website Risk Management Healthcare Office Tips Analytics Augmented Reality Virtual Private Network Storage Password Big Data Health Bring Your Own Device Document Management Going Green Customer Service Windows 11 Scam Cybercrime Data loss Monitoring Excel Patch Management Remote Workers Save Money Firewall Remote Monitoring Telephone End of Support Vulnerability Vendor Management Physical Security Cooperation Free Resource The Internet of Things Display Project Management Printer Windows 7 Social Paperless Office Infrastructure Microsoft 365 Solutions Employees Integration User Tip Modem Hacking Mobile Security Presentation Settings Maintenance Processor Printing Antivirus Wireless Content Filtering Holidays Wireless Technology Data Storage YouTube Smart Technology Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Word Robot Virtual Desktop Data storage LiFi Managed IT Service Downloads Outlook iPhone Licensing IT Management Meetings Money Safety VPN Entertainment Humor Vulnerabilities Data Privacy Images 101 Computer Repair Sports Telephone System Mouse Multi-Factor Authentication Mobility Cost Management Administration Customer Relationship Management Machine Learning Writing Legal Trend Micro IT solutions Specifications Security Cameras Workplace Strategies Lenovo Business Growth Fraud Meta Competition Microchip Virtual Reality Internet Exlporer Software as a Service Username Managing Costs Amazon Server Management Private Cloud Cortana Identity Theft eCommerce Black Friday SSID Superfish Alt Codes Virtual Assistant Outsource IT Twitter Database Surveillance IT Technicians Virtual Machine Environment Downtime Media User Error Proxy Server Reviews Social Engineering Cookies Hosted Solution Cyber Monday Medical IT Typing Hotspot Transportation Small Businesses Remote Computing Tactics Development Mirgation Hypervisor Displays IP Address Knowledge Tablet Shopping Google Drive Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Alert Addiction File Sharing Management PCI DSS Dark Data Chatbots Navigation Recovery Managed IT 5G Experience Gig Economy How To Google Docs Screen Reader Unified Communications Distributed Denial of Service Workplace Hard Drives Bitcoin Computing Infrastructure Teamwork Hiring/Firing Domains Running Cable Notifications Service Level Agreement Internet Service Provider Travel Regulations Compliance Google Wallet Identity Evernote Paperless Techology Google Maps Bookmark Smart Tech Memes Co-managed IT Refrigeration Windows 8 Alerts SQL Server Technology Care Public Speaking Laptop Download Net Neutrality Unified Threat Management Financial Data Drones History Lithium-ion battery Business Communications Unified Threat Management Entrepreneur Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Halloween Upload Procurement Social Network Telework Network Congestion Cyber security Multi-Factor Security Tech Human Resources User Error CES IoT Communitications Dark Web Cables Undo Hacks Scary Stories Trends Supply Chain Management Point of Sale Customer Resource management FinTech Regulations Google Calendar Term Google Apps Fun Data Analysis Star Wars IT Assessment Deep Learning Microsoft Excel IT Maintenance Staff Value Business Intelligence Network Management Tech Support Gamification Flexibility Organization Monitors Social Networking Education Legislation Shortcuts Application Fileless Malware Digital Security Cameras Smart Devices Ransmoware Content Remote Working Mobile Computing Wearable Technology Memory Vendors IBM Websites Health IT Motherboard Data Breach Comparison Google Play Be Proactive Search Best Practice Permissions Workforce SharePoint Directions Videos Electronic Medical Records Assessment Electronic Health Records Wasting Time Threats Buisness

Blog Archive