Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Week’s Tech Term: Blockchain

This Week’s Tech Term: Blockchain

As one of the most important emerging technologies out there at the moment, speculation about blockchain, and its growing list of practical applications, has run rampant. Soon, someone will come out with a blockchain application that makes and delivers pizzas. In all seriousness, it really holds a lot of promise for the development of interesting applications. For this week’s tech term, we look at the blockchain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Phishing Efficiency Google Workplace Tips Computer Privacy Collaboration Hosted Solutions Users IT Services Cybersecurity Ransomware Quick Tips Microsoft Data Backup Communication Small Business Mobile Device Smartphones Business Management Mobile Devices Workplace Strategy communications Android Smartphone VoIP Saving Money Microsoft Office Managed IT Services Data Recovery Browser Managed Service Social Media Passwords Disaster Recovery Network Upgrade Backup Internet of Things Tech Term Automation Cloud Computing Covid-19 Remote Artificial Intelligence Server Managed Service Provider Remote Work Facebook Miscellaneous Windows Gadgets Spam Encryption Outsourced IT Information Holiday Windows 10 Employee/Employer Relationship Business Continuity Government Data Management Productivity Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Data Security Apps Current Events Compliance Two-factor Authentication Chrome Vendor Networking Budget Managed Services Voice over Internet Protocol Apple Employer-Employee Relationship App Office Mobile Device Management Gmail Applications How To BDR Conferencing Hacker Computing Avoiding Downtime Access Control Information Technology Mobile Office Office 365 Augmented Reality HIPAA Router Managed IT Services WiFi Storage Big Data Password Bring Your Own Device Help Desk BYOD Computers Virtual Private Network Operating System Training Health Website Marketing Risk Management Retail Analytics Office Tips Scam Data loss The Internet of Things Remote Workers Social Healthcare Patch Management Save Money Monitoring Remote Monitoring End of Support Vulnerability Free Resource Vendor Management Project Management Going Green Customer Service Windows 7 Display Microsoft 365 Printer Windows 11 Cybercrime AI Telephone Paperless Office Solutions Infrastructure Excel Cooperation Tip of the week Document Management Firewall IT Support Money Safety Video Conferencing Managed Services Provider Humor Data Privacy Virtual Machines Professional Services Sports User Tip Modem Mouse Mobile Security Processor Robot iPhone Administration Smart Technology Customer Relationship Management Vulnerabilities IT Management Meetings Images 101 Saving Time VPN Hacking Settings Presentation Multi-Factor Authentication Mobility Printing Managed IT Service Wireless Computer Repair Content Filtering Wireless Technology Downloads YouTube 2FA Licensing Supply Chain Employees Cryptocurrency Entertainment Integration Machine Learning Word Virtual Desktop Data storage LiFi Telephone System Holidays Cost Management Data Storage Outlook Maintenance Antivirus Employer/Employee Relationships Permissions Human Resources Social Engineering Directions Assessment PCI DSS Undo Navigation Cables Remote Computing Scary Stories Gig Economy Hacks Specifications Internet Exlporer Teamwork Fraud Tablet Google Apps Fun Microchip Internet Service Provider Regulations Compliance Username Evernote Deep Learning IT Maintenance Alert Black Friday Business Intelligence File Sharing Dark Data Memes Managed IT Database SQL Server Education Shortcuts How To Net Neutrality Application Financial Data History IT Technicians Ransmoware Notifications Mobile Computing Cyber Monday Vendors Travel Smartwatch IBM Proxy Server IT Cookies Tactics Azure Techology Hotspot Google Maps Be Proactive Search Procurement Telework Cyber security Mirgation Tech Best Practice Workforce Threats Unified Threat Management Buisness CES Communitications Nanotechnology Addiction Unified Threat Management Legal Language IT solutions Workplace Strategies Supply Chain Management FinTech Competition Management Chatbots Term Business Growth Meta Distributed Denial of Service Amazon Network Congestion IT Assessment Screen Reader Service Level Agreement Value User Error Computing Infrastructure Physical Security Cortana Flexibility Organization Identity Alt Codes Outsource IT Environment Point of Sale Downtime Media Digital Security Cameras Bookmark Smart Devices User Smart Tech Download Memory Alerts Hosted Solution Remote Working Tech Support Data Breach Google Play Network Management Typing Small Businesses Break Fix Displays Videos Monitors IP Address Browsers Electronic Health Records Connectivity Upload Wasting Time Google Drive Knowledge Websites Social Network Trend Micro Security Cameras Multi-Factor Security Outsourcing Dark Web 5G Software as a Service Recovery IoT Hard Drives Trends Managing Costs SharePoint Google Docs Unified Communications Workplace Electronic Medical Records Experience Running Cable Domains Customer Resource management eCommerce Regulations SSID Bitcoin Google Calendar Hiring/Firing Lenovo Google Wallet Microsoft Excel Paperless Writing Data Analysis Surveillance Star Wars Virtual Assistant Refrigeration Gamification Virtual Machine Staff Co-managed IT Virtual Reality Technology Care Private Cloud Laptop Reviews Public Speaking Social Networking Medical IT Server Management Windows 8 Legislation Transportation Superfish Drones Identity Theft Business Communications Lithium-ion battery Fileless Malware Development Content Hypervisor Entrepreneur Wearable Technology Scams Twitter Hybrid Work Error Halloween Shopping Health IT Optimization Motherboard PowerPoint Comparison

Blog Archive