Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Information Facebook Holiday Miscellaneous Compliance Cloud Computing Covid-19 Training Gadgets Outsourced IT Server Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Windows 10 Blockchain Wi-Fi Virtualization Apps Mobile Office Data Security Vendor Two-factor Authentication Employer-Employee Relationship Tip of the week Chrome Managed Services Budget Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail BYOD WiFi Office 365 Conferencing Hacker Avoiding Downtime Marketing How To BDR HIPAA Computing Applications Information Technology Access Control 2FA Help Desk Office Tips Analytics Augmented Reality Computers Retail Storage Password Healthcare Bring Your Own Device Website Managed IT Services Operating System Router Physical Security Big Data Virtual Private Network Risk Management Health Monitoring Excel Customer Service Document Management Remote Workers Managed IT Service Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Firewall Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime The Internet of Things Display Social Printer Paperless Office Windows 11 Infrastructure Data Storage Customer Relationship Management Smart Technology Supply Chain Outlook Video Conferencing Managed Services Provider Machine Learning Saving Time Money Virtual Machines Professional Services Humor Hacking Presentation Maintenance Wireless Technology Antivirus Sports Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy Word Images 101 Telephone System Multi-Factor Authentication Mobility Robot Cost Management Settings Printing Wireless Content Filtering Safety IT Management Employees VPN YouTube Meetings Integration Cryptocurrency User Tip Modem Computer Repair Processor Mobile Security Holidays Virtual Desktop Data storage LiFi Windows 8 Mirgation Hypervisor Displays Laptop Websites Shopping Drones Nanotechnology Optimization PowerPoint Electronic Medical Records SharePoint Addiction Language Employer/Employee Relationships Outsourcing Competition Chatbots Halloween Navigation Management PCI DSS Gig Economy Lenovo Screen Reader Distributed Denial of Service Workplace Writing Virtual Reality Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Hacks Server Management Identity Scary Stories Private Cloud Evernote Paperless Bookmark Superfish Smart Tech Memes User Identity Theft Co-managed IT Fun Alerts SQL Server Technology Care Twitter Download Net Neutrality Deep Learning Financial Data History Error Business Communications Browsers Smartwatch IP Address Connectivity IT Education Break Fix Scams Social Engineering Azure Hybrid Work Remote Computing Upload Procurement Social Network Telework Mobile Computing Cyber security Multi-Factor Security Tech Human Resources Search CES IoT Communitications Recovery Tablet Dark Web Cables Best Practice Alert Trends Supply Chain Management Hard Drives Customer Resource management FinTech Domains Managed IT Regulations Buisness File Sharing Google Calendar Term Google Apps Dark Data How To Data Analysis Legal Star Wars IT Assessment IT solutions Microsoft Excel IT Maintenance Refrigeration Business Growth Staff Value Business Intelligence Notifications Gamification Flexibility Organization Public Speaking Social Networking Travel Legislation Shortcuts Cortana Fileless Malware Digital Security Cameras Lithium-ion battery Techology Smart Devices Google Maps Ransmoware Alt Codes Wearable Technology Memory Vendors Entrepreneur Content Remote Working Health IT Motherboard Data Breach Downtime Unified Threat Management Comparison Google Play Be Proactive Directions Videos Unified Threat Management Assessment Electronic Health Records Hosted Solution Permissions Workforce Undo Typing Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Network Congestion Knowledge Microchip Google Drive User Error Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Username eCommerce Point of Sale Black Friday SSID 5G Experience Google Docs Database Surveillance Application Unified Communications Virtual Assistant Outsource IT Bitcoin Network Management IT Technicians Virtual Machine Environment Running Cable Tech Support Media Proxy Server Reviews IBM Google Wallet Cookies Cyber Monday Medical IT Monitors Tactics Development Hotspot Transportation Small Businesses

Blog Archive