Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Information Automation Artificial Intelligence Covid-19 Cloud Computing Miscellaneous Gadgets Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Budget Mobile Device Management Apple Networking Gmail App BYOD Employer-Employee Relationship Managed Services Voice over Internet Protocol Tip of the week Chrome Conferencing Marketing How To BDR WiFi HIPAA Computing Applications Information Technology Access Control Hacker Office 365 Avoiding Downtime Website Retail Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Virtual Private Network Risk Management 2FA Health Computers Help Desk Analytics Office Tips Augmented Reality Healthcare Telephone Free Resource Scam Data loss Project Management Firewall Windows 7 Cooperation Microsoft 365 Solutions Going Green Patch Management The Internet of Things Save Money Remote Monitoring Vulnerability End of Support Vendor Management Social Cybercrime Physical Security Windows 11 Display Printer Customer Service Paperless Office Excel Infrastructure Monitoring Remote Workers Document Management iPhone Managed IT Service Maintenance Word Vulnerabilities Antivirus Sports Downloads Data Privacy Mouse Licensing Images 101 Entertainment Administration Mobility Multi-Factor Authentication Safety Telephone System Robot Cost Management Settings Employees Integration Printing Wireless Content Filtering IT Management VPN YouTube Meetings Holidays Cryptocurrency User Tip Modem Customer Relationship Management Computer Repair Mobile Security Data Storage Processor Supply Chain Video Conferencing Virtual Desktop LiFi Hacking Managed Services Provider Data storage Virtual Machines Professional Services Presentation Smart Technology Outlook Machine Learning Wireless Technology Money Saving Time Humor IT Scams Hacks Server Management Scary Stories Private Cloud Identity Smartwatch Fun Recovery Procurement Azure Hybrid Work Superfish Bookmark Identity Theft Smart Tech Tech Human Resources Deep Learning Download Twitter Alerts Hard Drives Telework Cyber security Communitications Cables Error Domains CES Social Engineering Break Fix Supply Chain Management Browsers Education Connectivity Term Google Apps Upload Remote Computing Refrigeration FinTech IT Assessment IT Maintenance Mobile Computing Social Network Public Speaking Multi-Factor Security Lithium-ion battery Search Dark Web Flexibility Value Business Intelligence Tablet IoT Shortcuts Best Practice Trends Alert Organization Entrepreneur Smart Devices Ransmoware Managed IT Customer Resource management Buisness File Sharing Regulations Digital Security Cameras Dark Data Google Calendar How To Microsoft Excel Remote Working Memory Vendors Legal Data Analysis IT solutions Star Wars Google Play Be Proactive Business Growth Gamification Notifications Staff Undo Data Breach Electronic Health Records Workforce Travel Social Networking Videos Legislation Cortana Wasting Time Threats Techology Fileless Malware Google Maps Security Cameras Workplace Strategies Alt Codes Content Wearable Technology Trend Micro Software as a Service Meta Health IT Downtime Unified Threat Management Motherboard Comparison Hosted Solution Assessment Permissions Application Managing Costs Amazon Unified Threat Management Directions SSID Typing eCommerce Network Congestion Specifications Surveillance Virtual Assistant Outsource IT IBM Internet Exlporer Knowledge Fraud Virtual Machine Environment Google Drive User Error Microchip Media Medical IT Username Reviews 5G Black Friday Development Transportation Small Businesses Point of Sale Unified Communications Database Experience Hypervisor Displays Google Docs Optimization PowerPoint Bitcoin Network Management Running Cable Tech Support IT Technicians Competition Shopping Monitors Cyber Monday Employer/Employee Relationships Outsourcing Google Wallet Proxy Server Cookies Navigation Tactics Hotspot PCI DSS Workplace Windows 8 Laptop Websites Mirgation Gig Economy User Internet Service Provider Teamwork Hiring/Firing Drones Nanotechnology Evernote Paperless Addiction Electronic Medical Records Language Regulations Compliance SharePoint Memes Co-managed IT Management Halloween Chatbots IP Address Writing Distributed Denial of Service Net Neutrality SQL Server Technology Care Lenovo Screen Reader Business Communications Service Level Agreement Virtual Reality Computing Infrastructure Financial Data History

Blog Archive