Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Week’s Tech Term: Blockchain

This Week’s Tech Term: Blockchain

As one of the most important emerging technologies out there at the moment, speculation about blockchain, and its growing list of practical applications, has run rampant. Soon, someone will come out with a blockchain application that makes and delivers pizzas. In all seriousness, it really holds a lot of promise for the development of interesting applications. For this week’s tech term, we look at the blockchain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Data Recovery Disaster Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Automation Artificial Intelligence Information Cloud Computing Training Gadgets Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Virtualization Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Apps Two-factor Authentication Vendor Mobile Office Data Security Gmail App BYOD WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Networking Budget Mobile Device Management Apple Conferencing Computing Access Control Information Technology Office 365 Hacker Avoiding Downtime HIPAA How To Marketing BDR Applications Help Desk Virtual Private Network Operating System Big Data Healthcare Health Risk Management Retail Analytics Computers Office Tips Augmented Reality 2FA Managed IT Services Storage Website Router Password Bring Your Own Device Monitoring Vendor Management Going Green Physical Security The Internet of Things Display Printer Cybercrime Remote Workers Paperless Office Social Telephone Infrastructure Document Management Cooperation Free Resource Project Management Customer Service Windows 7 Windows 11 Microsoft 365 Scam Data loss Solutions Excel Patch Management Save Money Firewall Remote Monitoring End of Support Vulnerability Data Storage IT Management Smart Technology Meetings Video Conferencing Safety Data Privacy VPN Managed Services Provider Virtual Machines Professional Services Saving Time Settings Wireless Printing Content Filtering Computer Repair Managed IT Service YouTube Downloads iPhone Cryptocurrency Licensing Machine Learning Customer Relationship Management Vulnerabilities Entertainment Virtual Desktop Data storage LiFi Images 101 Hacking Outlook Presentation Mobility Telephone System Maintenance Multi-Factor Authentication Antivirus Cost Management Money Humor Wireless Technology Supply Chain Employees Integration Sports Mouse Word User Tip Modem Mobile Security Robot Processor Administration Holidays Human Resources IT solutions Entrepreneur Unified Threat Management Mirgation Hypervisor Legal Optimization PowerPoint Cables Business Growth Nanotechnology Shopping Language Network Congestion Employer/Employee Relationships Addiction Navigation Google Apps User Error Management Cortana Chatbots PCI DSS Undo IT Maintenance Alt Codes Screen Reader Gig Economy Distributed Denial of Service Service Level Agreement Point of Sale Computing Infrastructure Internet Service Provider Teamwork Business Intelligence Downtime Evernote Shortcuts Hosted Solution Identity Regulations Compliance Memes Ransmoware Typing Bookmark Network Management Smart Tech Tech Support Download Alerts Net Neutrality Monitors SQL Server Vendors Application Be Proactive Knowledge Financial Data History Google Drive Break Fix IT IBM Workforce Browsers Connectivity Smartwatch Websites Upload 5G Procurement Azure Threats Tech Workplace Strategies Unified Communications SharePoint Social Network Experience Telework Electronic Medical Records Multi-Factor Security Cyber security Google Docs Dark Web Communitications Meta Bitcoin Running Cable IoT CES Lenovo Trends Supply Chain Management Writing Amazon Google Wallet Competition Term Customer Resource management Regulations FinTech Virtual Reality Google Calendar Private Cloud Microsoft Excel IT Assessment Outsource IT Windows 8 Data Analysis Laptop Server Management Star Wars Superfish Gamification Identity Theft Staff Flexibility Value Environment Drones Media Social Networking Organization Twitter Legislation Error Smart Devices Small Businesses User Fileless Malware Halloween Digital Security Cameras Content Wearable Technology Remote Working Social Engineering Memory Displays Google Play Health IT Motherboard Remote Computing Comparison Data Breach Permissions Electronic Health Records IP Address Outsourcing Hacks Directions Scary Stories Assessment Videos Fun Tablet Wasting Time Security Cameras Workplace Deep Learning Alert Specifications Trend Micro File Sharing Fraud Software as a Service Dark Data Hiring/Firing Recovery Microchip Managed IT Internet Exlporer Paperless Education Username How To Managing Costs Hard Drives Domains SSID Co-managed IT Notifications Black Friday eCommerce Travel Surveillance Virtual Assistant Technology Care Mobile Computing Database Business Communications Techology Search Google Maps IT Technicians Virtual Machine Refrigeration Public Speaking Medical IT Scams Best Practice Proxy Server Cookies Reviews Cyber Monday Unified Threat Management Hotspot Development Lithium-ion battery Transportation Hybrid Work Buisness Tactics

Blog Archive