Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery Business Management Smartphones VoIP Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office App Managed Services Employer-Employee Relationship BYOD Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To 2FA Big Data Operating System Router Healthcare Virtual Private Network Risk Management Computers Health Help Desk Office Tips Analytics Website Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Going Green Patch Management Social Excel Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Remote Workers Physical Security Customer Service Display Printer Free Resource Paperless Office Project Management Infrastructure Monitoring Windows 7 Microsoft 365 Document Management Solutions Firewall Telephone Scam Data loss Cooperation Windows 11 The Internet of Things Data Storage Supply Chain Telephone System Robot Video Conferencing Managed Services Provider Cost Management Settings Virtual Machines Professional Services Printing Wireless Content Filtering Customer Relationship Management IT Management VPN YouTube Meetings iPhone Cryptocurrency User Tip Modem Hacking Processor Presentation Computer Repair Mobile Security Vulnerabilities Data Privacy Virtual Desktop Data storage LiFi Wireless Technology Images 101 Smart Technology Multi-Factor Authentication Outlook Mobility Machine Learning Money Saving Time Word Humor Managed IT Service Employees Maintenance Antivirus Sports Downloads Integration Mouse Licensing Safety Entertainment Administration Holidays Hypervisor Displays Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Notifications Staff Shopping Optimization PowerPoint Business Growth Gamification Employer/Employee Relationships Outsourcing Travel Social Networking Application Legislation PCI DSS Techology Fileless Malware Navigation Google Maps Cortana Wearable Technology Gig Economy Workplace Alt Codes Content IBM Teamwork Hiring/Firing Health IT Downtime Unified Threat Management Motherboard Comparison Internet Service Provider Regulations Compliance Unified Threat Management Directions Evernote Paperless Hosted Solution Assessment Permissions Memes Co-managed IT Typing SQL Server Technology Care Network Congestion Specifications Net Neutrality Financial Data History Google Drive User Error Microchip Business Communications Internet Exlporer Competition Knowledge Fraud Smartwatch IT Scams Username Azure Hybrid Work Point of Sale 5G Black Friday Procurement Telework Cyber security Google Docs Tech Human Resources Unified Communications Database Experience Running Cable Tech Support IT Technicians User CES Communitications Cables Bitcoin Network Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Supply Chain Management FinTech Term Google Apps Tactics Hotspot Windows 8 IP Address Laptop Websites Mirgation IT Assessment IT Maintenance Value Business Intelligence Drones Nanotechnology Flexibility Electronic Medical Records Language Organization SharePoint Shortcuts Addiction Management Halloween Chatbots Recovery Digital Security Cameras Smart Devices Ransmoware Memory Vendors Lenovo Screen Reader Hard Drives Writing Distributed Denial of Service Remote Working Virtual Reality Computing Infrastructure Data Breach Google Play Be Proactive Service Level Agreement Domains Hacks Server Management Scary Stories Private Cloud Identity Videos Electronic Health Records Workforce Wasting Time Threats Superfish Bookmark Identity Theft Smart Tech Refrigeration Fun Twitter Alerts Trend Micro Security Cameras Workplace Strategies Deep Learning Download Public Speaking Lithium-ion battery Error Software as a Service Meta Managing Costs Amazon Browsers Education Connectivity Social Engineering Break Fix Entrepreneur Remote Computing eCommerce SSID Upload Virtual Assistant Outsource IT Mobile Computing Social Network Multi-Factor Security Surveillance Virtual Machine Environment Media Tablet IoT Undo Search Dark Web Alert Reviews Medical IT Best Practice Trends Transportation Small Businesses Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Development

Blog Archive