Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Productivity Saving Money Cybersecurity Communication Smartphone Data Backup Managed Service Android Upgrade Data Recovery VoIP AI Business Management Smartphones communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Tech Term Network Internet of Things Remote Facebook Information Automation Artificial Intelligence Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Blockchain Virtualization Business Technology Bandwidth Mobile Office Data Security Two-factor Authentication Vendor Apps Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management Gmail BYOD Employer-Employee Relationship Tip of the week Chrome Budget Conferencing Avoiding Downtime How To Marketing BDR Computing WiFi Information Technology HIPAA Access Control Applications Office 365 Hacker Managed IT Services Website Healthcare Operating System Risk Management Virtual Private Network Big Data Router Health Analytics Office Tips Augmented Reality 2FA Retail Help Desk Storage Computers Password Bring Your Own Device Remote Workers Telephone Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource Firewall End of Support Vulnerability Project Management Windows 7 Vendor Management Cybercrime Microsoft 365 Physical Security The Internet of Things Display Printer Solutions Paperless Office Social Infrastructure Document Management Windows 11 Monitoring Customer Service Excel Scam Data loss Administration Managed IT Service Downloads iPhone Licensing Word Robot Vulnerabilities Entertainment Data Privacy Settings Wireless Printing Images 101 Content Filtering IT Management Multi-Factor Authentication YouTube Meetings Mobility Telephone System Safety VPN Cost Management Cryptocurrency Computer Repair Virtual Desktop Employees Data storage LiFi Integration Modem User Tip Processor Outlook Mobile Security Customer Relationship Management Machine Learning Holidays Money Humor Data Storage Hacking Supply Chain Smart Technology Video Conferencing Presentation Maintenance Antivirus Managed Services Provider Sports Virtual Machines Professional Services Saving Time Mouse Wireless Technology Paperless Evernote Regulations Compliance IP Address Mobile Computing Identity Memes Smart Tech Tablet Co-managed IT Search Bookmark Net Neutrality Download Best Practice Technology Care Alerts SQL Server Alert Business Communications Dark Data Financial Data Managed IT History Recovery Buisness File Sharing IT Connectivity Hard Drives IT solutions Scams Break Fix How To Smartwatch Browsers Legal Procurement Upload Domains Business Growth Hybrid Work Azure Notifications Human Resources Multi-Factor Security Tech Telework Social Network Cyber security Travel Techology Communitications IoT Refrigeration Google Maps Cables Dark Web Cortana CES Supply Chain Management Trends Public Speaking Alt Codes Downtime Unified Threat Management Google Apps Google Calendar Term FinTech Customer Resource management Lithium-ion battery Regulations Data Analysis Unified Threat Management IT Assessment Star Wars Hosted Solution IT Maintenance Microsoft Excel Entrepreneur Flexibility Gamification Typing Business Intelligence Staff Value Social Networking Shortcuts Legislation Network Congestion Organization Digital Security Cameras Fileless Malware Google Drive User Error Smart Devices Undo Ransmoware Knowledge Remote Working Content Vendors Wearable Technology Memory Data Breach Motherboard Point of Sale Be Proactive Comparison Google Play 5G Health IT Videos Directions Google Docs Electronic Health Records Assessment Unified Communications Workforce Permissions Experience Bitcoin Network Management Threats Wasting Time Running Cable Tech Support Trend Micro Application Workplace Strategies Specifications Security Cameras Monitors Google Wallet Microchip Software as a Service Internet Exlporer Meta Fraud Username IBM Windows 8 Amazon Managing Costs Laptop Websites eCommerce Black Friday SSID Drones SharePoint Surveillance Database Outsource IT Virtual Assistant Electronic Medical Records Media Environment IT Technicians Virtual Machine Halloween Cookies Cyber Monday Medical IT Writing Reviews Proxy Server Lenovo Development Tactics Competition Small Businesses Hotspot Transportation Virtual Reality Hacks Server Management Displays Mirgation Hypervisor Scary Stories Private Cloud Optimization Nanotechnology Identity Theft PowerPoint Fun Shopping Superfish Addiction Deep Learning Outsourcing Language Employer/Employee Relationships Twitter Navigation PCI DSS Management Chatbots User Error Screen Reader Education Workplace Distributed Denial of Service Social Engineering Gig Economy Internet Service Provider Service Level Agreement Hiring/Firing Computing Infrastructure Teamwork Remote Computing

Blog Archive