Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google IT Services Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Disaster Recovery Data Recovery AI Upgrade Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Holiday Miscellaneous Automation Artificial Intelligence Information Training Gadgets Covid-19 Cloud Computing Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Two-factor Authentication Apps Mobile Office Data Security Vendor WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Mobile Device Management Gmail BYOD Applications Information Technology Access Control Office 365 Conferencing Hacker Avoiding Downtime How To Marketing BDR HIPAA Computing Risk Management Virtual Private Network Big Data Health Healthcare Help Desk Analytics Office Tips Augmented Reality Retail Storage Computers Password Bring Your Own Device Managed IT Services Website Operating System Router 2FA The Internet of Things Display Excel Printer Paperless Office Social Remote Workers Infrastructure Monitoring Document Management Free Resource Customer Service Project Management Windows 7 Telephone Scam Data loss Microsoft 365 Cooperation Solutions Going Green Patch Management Save Money Remote Monitoring Firewall End of Support Vulnerability Vendor Management Windows 11 Cybercrime Physical Security Cryptocurrency Video Conferencing Modem Managed Services Provider User Tip Processor Virtual Machines Computer Repair Mobile Security Professional Services Virtual Desktop Data storage LiFi Smart Technology Outlook iPhone Customer Relationship Management Machine Learning Money Saving Time Humor Vulnerabilities Data Privacy Hacking Managed IT Service Images 101 Maintenance Presentation Sports Downloads Antivirus Mouse Multi-Factor Authentication Mobility Wireless Technology Licensing Entertainment Administration Employees Integration Word Robot Telephone System Cost Management Settings Wireless Printing Holidays Content Filtering IT Management Safety Data Storage YouTube Meetings VPN Supply Chain Employer/Employee Relationships Outsourcing Username PCI DSS Point of Sale 5G Black Friday Navigation Google Docs Gig Economy Unified Communications Database Experience Workplace Teamwork Hiring/Firing Bitcoin Network Management Internet Service Provider Running Cable Tech Support IT Technicians Regulations Compliance Cookies Application Monitors Cyber Monday Evernote Paperless Google Wallet Proxy Server Tactics Memes Hotspot Co-managed IT SQL Server Technology Care Windows 8 IBM Net Neutrality Laptop Websites Mirgation Financial Data Nanotechnology History Business Communications Drones SharePoint Smartwatch Addiction IT Electronic Medical Records Language Scams Azure Hybrid Work Management Procurement Halloween Chatbots Telework Screen Reader Cyber security Writing Distributed Denial of Service Tech Human Resources Lenovo CES Service Level Agreement Competition Communitications Virtual Reality Computing Infrastructure Cables Hacks Server Management Supply Chain Management Scary Stories Private Cloud Identity Superfish Bookmark FinTech Identity Theft Smart Tech Fun Term Google Apps Deep Learning Download IT Assessment Twitter Alerts IT Maintenance Error User Value Business Intelligence Flexibility Browsers Organization Education Connectivity Social Engineering Break Fix Shortcuts Digital Security Cameras Upload Smart Devices Remote Computing Ransmoware Memory Vendors Multi-Factor Security Mobile Computing Social Network IP Address Remote Working Tablet IoT Data Breach Search Dark Web Google Play Be Proactive Videos Best Practice Trends Electronic Health Records Alert Workforce Buisness File Sharing Regulations Recovery Wasting Time Threats Dark Data Google Calendar Managed IT Customer Resource management Legal Data Analysis IT solutions Star Wars Hard Drives Trend Micro How To Microsoft Excel Security Cameras Workplace Strategies Meta Business Growth Gamification Domains Software as a Service Notifications Staff Travel Social Networking Managing Costs Amazon Legislation Techology Fileless Malware Google Maps Refrigeration eCommerce Cortana SSID Virtual Assistant Outsource IT Alt Codes Content Public Speaking Surveillance Wearable Technology Lithium-ion battery Downtime Unified Threat Management Motherboard Virtual Machine Environment Comparison Media Health IT Unified Threat Management Directions Reviews Hosted Solution Assessment Permissions Entrepreneur Medical IT Transportation Small Businesses Typing Development Hypervisor Displays Network Congestion Specifications Google Drive User Error Microchip Shopping Internet Exlporer Undo Optimization Knowledge Fraud PowerPoint

Blog Archive