Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google IT Services Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Smartphones VoIP Business Management communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Covid-19 Gadgets Cloud Computing Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Mobile Device Management Gmail Apple Networking App WiFi HIPAA Computing Applications Information Technology Hacker Access Control Office 365 Avoiding Downtime Marketing Conferencing How To BDR Operating System Router Virtual Private Network Risk Management Computers 2FA Health Help Desk Office Tips Analytics Augmented Reality Website Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Solutions Social Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Physical Security Display Customer Service Windows 11 Printer Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Telephone Firewall Scam Data loss Free Resource Project Management Cooperation Windows 7 The Internet of Things Microsoft 365 Going Green Patch Management Save Money Settings Printing Wireless Employees Content Filtering Integration IT Management VPN YouTube Meetings Customer Relationship Management Cryptocurrency User Tip Modem Computer Repair Mobile Security Holidays Processor Hacking Virtual Desktop Data Storage Presentation Supply Chain Data storage LiFi Video Conferencing Smart Technology Wireless Technology Managed Services Provider Virtual Machines Professional Services Outlook Machine Learning Money Saving Time Humor Word Managed IT Service iPhone Maintenance Antivirus Sports Downloads Mouse Licensing Vulnerabilities Data Privacy Entertainment Administration Images 101 Safety Multi-Factor Authentication Mobility Telephone System Robot Cost Management Videos Wearable Technology Electronic Health Records Application Workforce Alt Codes Content Health IT Downtime Unified Threat Management Motherboard Comparison Wasting Time Threats IBM Trend Micro Security Cameras Workplace Strategies Unified Threat Management Directions Hosted Solution Assessment Permissions Software as a Service Meta Typing Network Congestion Specifications Managing Costs Amazon eCommerce SSID Google Drive User Error Microchip Internet Exlporer Knowledge Fraud Username Surveillance Virtual Assistant Outsource IT Media Point of Sale 5G Black Friday Competition Virtual Machine Environment Experience Medical IT Google Docs Unified Communications Database Reviews Bitcoin Network Management Running Cable Tech Support IT Technicians Development Transportation Small Businesses Google Wallet Proxy Server Cookies Monitors Cyber Monday Hypervisor Displays Hotspot Optimization User PowerPoint Tactics Shopping Windows 8 Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Navigation Drones Nanotechnology PCI DSS Electronic Medical Records Language IP Address Workplace SharePoint Addiction Gig Economy Management Halloween Chatbots Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Lenovo Screen Reader Regulations Compliance Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Memes Recovery Co-managed IT Service Level Agreement Hacks Server Management Scary Stories Private Cloud Identity Net Neutrality Hard Drives SQL Server Technology Care Business Communications Superfish Bookmark Identity Theft Smart Tech Financial Data Fun Domains History Twitter Alerts IT Scams Deep Learning Download Smartwatch Error Procurement Refrigeration Azure Hybrid Work Tech Human Resources Browsers Education Connectivity Telework Social Engineering Break Fix Public Speaking Cyber security Remote Computing Lithium-ion battery Communitications Cables Upload CES Mobile Computing Social Network Supply Chain Management Multi-Factor Security Entrepreneur Term Google Apps Tablet IoT FinTech Search Dark Web Alert IT Assessment IT Maintenance Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Flexibility Dark Data Google Calendar Undo Value Business Intelligence Shortcuts Legal Data Analysis IT solutions Star Wars Organization How To Microsoft Excel Digital Security Cameras Notifications Staff Smart Devices Ransmoware Business Growth Gamification Travel Social Networking Remote Working Legislation Memory Vendors Data Breach Google Play Be Proactive Techology Fileless Malware Google Maps Cortana

Blog Archive