Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Training Covid-19 Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Managed Services Mobile Office Vendor Two-factor Authentication Apps App Voice over Internet Protocol BYOD Mobile Device Management Gmail WiFi Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking BDR Hacker Avoiding Downtime Marketing HIPAA Computing Physical Security Applications Information Technology Access Control Office 365 Conferencing Managed IT Services How To Computers Operating System Website Healthcare Router Risk Management Virtual Private Network Health Help Desk Analytics Office Tips Augmented Reality Big Data Retail Storage Password Bring Your Own Device 2FA Excel Going Green Patch Management Save Money Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Cybercrime Display Firewall Printer Free Resource Project Management Paperless Office Windows 7 Infrastructure Monitoring Microsoft 365 The Internet of Things Solutions Document Management Social Managed IT Service Telephone Scam Data loss Windows 11 Cooperation Customer Service Presentation Video Conferencing Managed Services Provider Robot Virtual Machines Telephone System Professional Services Cost Management Wireless Technology Settings Wireless Printing Content Filtering IT Management YouTube Meetings VPN iPhone Word Cryptocurrency Modem User Tip Vulnerabilities Processor Data Privacy Computer Repair Mobile Security Virtual Desktop Images 101 Data storage LiFi Safety Multi-Factor Authentication Mobility Smart Technology Outlook Machine Learning Money Saving Time Humor Employees Integration Maintenance Downloads Antivirus Sports Mouse Licensing Customer Relationship Management Holidays Entertainment Administration Data Storage Hacking Supply Chain Legal Data Analysis Employer/Employee Relationships Outsourcing IT solutions Star Wars How To Microsoft Excel PCI DSS User Business Growth Gamification Navigation Notifications Staff Travel Social Networking Legislation Gig Economy Workplace Techology Fileless Malware Teamwork Hiring/Firing Google Maps Cortana Internet Service Provider Regulations Compliance Alt Codes Content Evernote Paperless Wearable Technology IP Address Downtime Unified Threat Management Motherboard Comparison Memes Health IT Co-managed IT Unified Threat Management Directions SQL Server Technology Care Hosted Solution Assessment Permissions Net Neutrality Financial Data Recovery History Typing Business Communications Network Congestion Specifications Smartwatch Hard Drives IT Scams Google Drive User Error Microchip Azure Hybrid Work Internet Exlporer Knowledge Fraud Domains Procurement Telework Cyber security Username Tech Human Resources Point of Sale 5G Black Friday CES Refrigeration Communitications Cables Google Docs Unified Communications Database Experience Public Speaking Supply Chain Management Lithium-ion battery FinTech Bitcoin Network Management Term Google Apps Running Cable Tech Support IT Technicians Cookies Monitors Cyber Monday IT Assessment Entrepreneur Google Wallet Proxy Server IT Maintenance Flexibility Value Business Intelligence Tactics Hotspot Organization Windows 8 Shortcuts Laptop Websites Mirgation Ransmoware Nanotechnology Digital Security Cameras Undo Smart Devices Drones Remote Working SharePoint Memory Vendors Addiction Electronic Medical Records Language Data Breach Management Google Play Be Proactive Halloween Chatbots Workforce Screen Reader Writing Distributed Denial of Service Videos Electronic Health Records Lenovo Wasting Time Threats Service Level Agreement Virtual Reality Computing Infrastructure Application Trend Micro Hacks Server Management Security Cameras Workplace Strategies Scary Stories Private Cloud Identity Meta Identity Theft Smart Tech Fun Software as a Service Superfish Bookmark Managing Costs Amazon Deep Learning Download Twitter Alerts IBM eCommerce SSID Error Virtual Assistant Outsource IT Education Connectivity Social Engineering Break Fix Surveillance Browsers Virtual Machine Environment Upload Media Remote Computing Multi-Factor Security Reviews Mobile Computing Social Network Medical IT Transportation Small Businesses Tablet IoT Search Dark Web Competition Development Hypervisor Displays Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar Shopping Optimization Managed IT Customer Resource management PowerPoint

Blog Archive