Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Ransomware Mobile Device Microsoft Productivity Managed Service Passwords Quick Tips Saving Money Communication Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Facebook Information Automation Miscellaneous Artificial Intelligence Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Business Technology Bandwidth Data Security Mobile Office Two-factor Authentication Vendor Apps Managed Services App Voice over Internet Protocol Mobile Device Management BYOD Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking How To Avoiding Downtime Conferencing BDR Marketing Computing Information Technology Access Control HIPAA Office 365 Applications Hacker Website Healthcare Operating System Physical Security Risk Management Virtual Private Network Health Big Data Analytics Router Office Tips Augmented Reality Retail Storage Password 2FA Help Desk Bring Your Own Device Computers Managed IT Services Remote Workers Going Green Patch Management Telephone Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Cooperation Free Resource Firewall Project Management Windows 7 Display Printer Microsoft 365 Paperless Office The Internet of Things Infrastructure Solutions Social Document Management Windows 11 Scam Monitoring Customer Service Data loss Excel Saving Time Virtual Machines Professional Services Wireless Technology Managed IT Service Robot Downloads Settings iPhone Licensing Wireless Printing Word Content Filtering Entertainment IT Management Vulnerabilities YouTube Meetings Data Privacy VPN Images 101 Cryptocurrency Safety Telephone System Multi-Factor Authentication Computer Repair Mobility Cost Management Virtual Desktop Data storage LiFi Outlook Employees Machine Learning Integration Money Humor User Tip Modem Mobile Security Processor Customer Relationship Management Maintenance Holidays Sports Antivirus Mouse Data Storage Hacking Smart Technology Supply Chain Presentation Video Conferencing Administration Managed Services Provider Gig Economy Best Practice Screen Reader Alert Distributed Denial of Service Workplace Buisness File Sharing Computing Infrastructure Teamwork Hiring/Firing Dark Data Managed IT Service Level Agreement Internet Service Provider Legal Regulations Compliance IT solutions Identity How To Evernote Paperless IP Address Bookmark Business Growth Smart Tech Memes Notifications Co-managed IT Travel Alerts SQL Server Technology Care Download Net Neutrality Techology Recovery Financial Data Google Maps History Cortana Business Communications Hard Drives Browsers Smartwatch Alt Codes Connectivity IT Break Fix Scams Downtime Unified Threat Management Azure Hybrid Work Domains Upload Procurement Unified Threat Management Social Network Telework Hosted Solution Cyber security Multi-Factor Security Tech Human Resources Refrigeration CES Typing IoT Communitications Dark Web Cables Trends Supply Chain Management Network Congestion Public Speaking Lithium-ion battery Google Drive User Error Customer Resource management FinTech Regulations Knowledge Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Entrepreneur Star Wars IT Assessment Gamification Flexibility Point of Sale Staff Value Business Intelligence 5G Google Docs Organization Unified Communications Social Networking Experience Legislation Shortcuts Ransmoware Undo Fileless Malware Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support Google Wallet Content Remote Working Wearable Technology Memory Vendors Monitors Health IT Motherboard Data Breach Comparison Google Play Be Proactive Laptop Websites Permissions Workforce Directions Videos Windows 8 Assessment Electronic Health Records Drones Wasting Time Threats SharePoint Application Trend Micro Electronic Medical Records Specifications Security Cameras Workplace Strategies Halloween Fraud Meta Microchip Internet Exlporer Software as a Service Lenovo Username Managing Costs Amazon Writing IBM eCommerce Virtual Reality Black Friday SSID Scary Stories Private Cloud Virtual Assistant Outsource IT Hacks Server Management Database Surveillance Superfish Identity Theft IT Technicians Virtual Machine Environment Fun Media Proxy Server Reviews Deep Learning Cookies Twitter Cyber Monday Medical IT Error Hotspot Transportation Small Businesses Competition Tactics Development Education Mirgation Hypervisor Displays Social Engineering Shopping Nanotechnology Optimization Remote Computing PowerPoint Language Employer/Employee Relationships Outsourcing Mobile Computing Addiction User Management PCI DSS Tablet Chatbots Search Navigation

Blog Archive