Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android AI Upgrade VoIP Business Management Smartphones Disaster Recovery Data Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing 2FA Big Data Operating System Healthcare Router Virtual Private Network Risk Management Computers Health Help Desk Office Tips Analytics Website Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Cooperation The Internet of Things Excel Going Green Patch Management Social Save Money Remote Monitoring Remote Workers Vulnerability End of Support Vendor Management Cybercrime Physical Security Customer Service Display Printer Free Resource Project Management Paperless Office Windows 7 Infrastructure Monitoring Microsoft 365 Document Management Solutions Firewall Telephone Scam Data loss Windows 11 Data Storage Supply Chain Video Conferencing Managed Services Provider Telephone System Virtual Machines Professional Services Robot Cost Management Settings Printing Wireless Content Filtering Customer Relationship Management IT Management VPN YouTube Meetings iPhone Cryptocurrency User Tip Modem Vulnerabilities Hacking Processor Data Privacy Presentation Computer Repair Mobile Security Images 101 Virtual Desktop Data storage LiFi Wireless Technology Multi-Factor Authentication Mobility Smart Technology Outlook Machine Learning Money Saving Time Word Humor Employees Integration Managed IT Service Maintenance Antivirus Sports Downloads Mouse Licensing Holidays Safety Entertainment Administration Alert Best Practice Trends Hypervisor Displays Managed IT Customer Resource management Optimization Buisness File Sharing Regulations PowerPoint Dark Data Google Calendar Shopping Legal Data Analysis IT solutions Star Wars Employer/Employee Relationships Outsourcing How To Microsoft Excel Notifications Staff Navigation PCI DSS Business Growth Gamification Travel Social Networking Workplace Application Legislation Gig Economy Techology Fileless Malware Internet Service Provider Google Maps Teamwork Hiring/Firing Cortana IBM Wearable Technology Evernote Paperless Regulations Compliance Alt Codes Content Health IT Memes Downtime Unified Threat Management Motherboard Co-managed IT Comparison Unified Threat Management Directions Net Neutrality Hosted Solution Assessment SQL Server Technology Care Permissions History Business Communications Financial Data Typing Smartwatch IT Scams Network Congestion Specifications Google Drive User Error Microchip Procurement Internet Exlporer Azure Hybrid Work Competition Knowledge Fraud Cyber security Tech Human Resources Telework Username CES Communitications Point of Sale Cables 5G Black Friday Google Docs Supply Chain Management Unified Communications Database Experience Bitcoin Network Management Running Cable Tech Support IT Technicians Term Google Apps User FinTech Google Wallet Proxy Server IT Assessment Cookies IT Maintenance Monitors Cyber Monday Hotspot Flexibility Tactics Value Business Intelligence Windows 8 IP Address Laptop Websites Mirgation Shortcuts Organization Digital Security Cameras Drones Smart Devices Nanotechnology Ransmoware Electronic Medical Records Language SharePoint Remote Working Addiction Memory Vendors Management Data Breach Halloween Chatbots Google Play Be Proactive Recovery Videos Lenovo Electronic Health Records Screen Reader Workforce Hard Drives Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Service Level Agreement Wasting Time Threats Domains Hacks Server Management Trend Micro Scary Stories Private Cloud Identity Security Cameras Workplace Strategies Superfish Bookmark Software as a Service Identity Theft Smart Tech Meta Refrigeration Fun Twitter Alerts Deep Learning Download Managing Costs Amazon Public Speaking eCommerce Lithium-ion battery Error SSID Browsers Surveillance Education Connectivity Virtual Assistant Outsource IT Social Engineering Break Fix Entrepreneur Remote Computing Media Upload Virtual Machine Environment Mobile Computing Social Network Medical IT Multi-Factor Security Reviews Development Tablet IoT Transportation Small Businesses Undo Search Dark Web

Blog Archive