Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Week’s Tech Term: Blockchain

This Week’s Tech Term: Blockchain

As one of the most important emerging technologies out there at the moment, speculation about blockchain, and its growing list of practical applications, has run rampant. Soon, someone will come out with a blockchain application that makes and delivers pizzas. In all seriousness, it really holds a lot of promise for the development of interesting applications. For this week’s tech term, we look at the blockchain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Backup Small Business Hosted Solutions Collaboration Ransomware Users AI Managed Service Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Compliance Managed Service Provider Remote Work IT Support Outsourced IT Server Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Blockchain Wi-Fi Vendor Windows 10 Virtualization Business Technology Bandwidth Mobile Office Two-factor Authentication Apps Managed Services Data Security Mobile Device Management BYOD Gmail WiFi Chrome Tip of the week Budget Employer-Employee Relationship Voice over Internet Protocol Apple Networking App Marketing Computing HIPAA Physical Security Information Technology Applications Office 365 Access Control Conferencing Password Managed IT Services Hacker How To BDR Avoiding Downtime Website Operating System Router Risk Management Virtual Private Network Health Analytics Office Tips 2FA Big Data Help Desk Augmented Reality Storage Retail Healthcare Bring Your Own Device Computers Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Cybercrime Vulnerability Vendor Management Solutions Firewall Display Printer Windows 11 The Internet of Things Paperless Office Infrastructure Monitoring Social Excel Document Management Managed IT Service Remote Workers Telephone Customer Service Scam Data loss Cooperation Free Resource Project Management Windows 7 Going Green Robot Mobility Settings Telephone System Multi-Factor Authentication Wireless Cost Management Printing Content Filtering Word YouTube IT Management Cryptocurrency VPN Employees Meetings Integration User Tip Modem Computer Repair Mobile Security Safety Virtual Desktop Processor LiFi Data storage Holidays Data Storage Outlook Smart Technology Supply Chain Video Conferencing Money Machine Learning Managed Services Provider Humor Professional Services Saving Time Virtual Machines Customer Relationship Management Sports Maintenance Mouse Downloads Antivirus iPhone Hacking Licensing Administration Presentation Vulnerabilities Entertainment Data Privacy Wireless Technology Images 101 Legislation Shortcuts Alt Codes Organization Travel Social Networking Google Maps Smart Devices Ransmoware Downtime Recovery Techology Fileless Malware Digital Security Cameras Hosted Solution Hard Drives Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Typing Domains Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Refrigeration Knowledge Wasting Time Threats Google Drive Network Congestion Specifications Security Cameras Workplace Strategies Public Speaking Trend Micro 5G Internet Exlporer Software as a Service Fraud Meta Lithium-ion battery User Error Microchip Unified Communications Experience Entrepreneur Username Managing Costs Amazon Google Docs Black Friday SSID Bitcoin Running Cable Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Google Wallet Undo Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Windows 8 Laptop Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Drones Websites Mirgation Hypervisor Displays PowerPoint Halloween Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Application SharePoint Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Workplace Hacks IBM Scary Stories Lenovo Gig Economy Screen Reader Fun Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Deep Learning Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Identity Theft Smart Tech Memes Co-managed IT Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Education Business Communications Competition Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Mobile Computing Browsers Smartwatch Search Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Best Practice Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables Buisness User CES IT solutions Trends Supply Chain Management Alert Legal Dark Data Google Calendar Term Google Apps Business Growth Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance IP Address Data Analysis Cortana Gamification Flexibility Notifications Staff Value Business Intelligence

Blog Archive