Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Network Current Events Remote Internet of Things Tech Term Automation Information Artificial Intelligence Facebook Covid-19 Cloud Computing Miscellaneous Gadgets Holiday Training Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption IT Support Employee/Employer Relationship Spam Windows 10 Office Data Management Government Business Continuity Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Mobile Office Two-factor Authentication Vendor Data Security Apps Tip of the week Mobile Device Management Networking Gmail Chrome Budget BYOD Apple Managed Services Employer-Employee Relationship Voice over Internet Protocol App Access Control Hacker Computing Avoiding Downtime Information Technology Marketing HIPAA Office 365 Applications How To BDR WiFi Conferencing Health Computers 2FA Operating System Website Retail Risk Management Router Managed IT Services Analytics Office Tips Augmented Reality Storage Help Desk Big Data Password Bring Your Own Device Virtual Private Network Healthcare Going Green Windows 11 Customer Service Paperless Office Infrastructure Cooperation Free Resource Cybercrime Project Management Excel Windows 7 Document Management Microsoft 365 Scam Solutions Data loss Firewall Patch Management The Internet of Things Save Money Monitoring Remote Monitoring End of Support Vulnerability Vendor Management Social Physical Security Display Remote Workers Printer Telephone iPhone Licensing Hacking Settings Presentation Printing Supply Chain Entertainment Wireless Vulnerabilities Content Filtering Wireless Technology Machine Learning YouTube Images 101 Telephone System Multi-Factor Authentication Mobility Cryptocurrency Cost Management Maintenance Antivirus Word Virtual Desktop Data storage LiFi Employees Integration Outlook Data Privacy User Tip Modem Money Processor Safety Mobile Security Humor Robot Holidays Data Storage Sports Smart Technology Mouse Video Conferencing Managed Services Provider IT Management Saving Time Virtual Machines VPN Professional Services Meetings Administration Customer Relationship Management Managed IT Service Computer Repair Downloads Monitors Browsers Smartwatch Connectivity IT Break Fix Azure Small Businesses Cortana Upload Procurement Social Network Telework Cyber security Displays Multi-Factor Security Tech Websites Alt Codes Downtime CES IoT Communitications Dark Web User Outsourcing Electronic Medical Records Hosted Solution Trends Supply Chain Management SharePoint Customer Resource management FinTech Regulations Google Calendar Term Typing Workplace Writing Data Analysis Star Wars IT Assessment Lenovo IP Address Microsoft Excel Staff Value Google Drive Hiring/Firing Virtual Reality Knowledge Gamification Flexibility Organization Social Networking Server Management Legislation Private Cloud Paperless Recovery Co-managed IT Fileless Malware Digital Security Cameras 5G Smart Devices Superfish Identity Theft Wearable Technology Memory Hard Drives Google Docs Technology Care Twitter Unified Communications Experience Content Remote Working Running Cable Health IT Motherboard Data Breach Domains Comparison Google Play Error Bitcoin Business Communications Google Wallet Scams Social Engineering Directions Videos Assessment Electronic Health Records Permissions Wasting Time Refrigeration Hybrid Work Remote Computing Laptop Trend Micro Public Speaking Specifications Security Cameras Windows 8 Human Resources Tablet Drones Cables Microchip Internet Exlporer Software as a Service Lithium-ion battery Fraud Managing Costs Alert Entrepreneur Username Dark Data Halloween eCommerce Managed IT Black Friday SSID File Sharing Google Apps IT Maintenance How To Database Surveillance Virtual Assistant IT Technicians Virtual Machine Undo Business Intelligence Notifications Scary Stories Proxy Server Reviews Cookies Cyber Monday Medical IT Travel Hacks Shortcuts Hotspot Transportation Google Maps Ransmoware Fun Tactics Development Techology Mirgation Hypervisor Vendors Deep Learning Be Proactive Shopping Nanotechnology Optimization PowerPoint Unified Threat Management Language Employer/Employee Relationships Application Workforce Education Addiction Unified Threat Management Management PCI DSS Chatbots Threats Navigation Workplace Strategies Network Congestion Gig Economy Screen Reader IBM Distributed Denial of Service Mobile Computing Computing Infrastructure Teamwork Meta Search Service Level Agreement Internet Service Provider User Error Regulations Compliance Identity Amazon Evernote Best Practice Buisness Bookmark Smart Tech Memes Point of Sale Alerts SQL Server Legal Outsource IT IT solutions Download Net Neutrality Financial Data History Network Management Competition Environment Tech Support Business Growth Media

Blog Archive