Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Police Recruit Eagles to Take Out Illegal Drones... Seriously

b2ap3_thumbnail_eagles_for_drones_400.jpgWhile they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Cybersecurity Small Business Microsoft Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service VoIP Business Management Smartphones Android Upgrade communications Mobile Devices Disaster Recovery Browser Data Recovery Managed IT Services Social Media Windows Microsoft Office Tech Term Current Events Remote Network Internet of Things Productivity Artificial Intelligence Automation Facebook Cloud Computing AI Covid-19 Gadgets Server Managed Service Provider Remote Work Miscellaneous Holiday Outsourced IT Information Training Compliance Employee/Employer Relationship Encryption Spam Windows 10 Office Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Virtualization Blockchain Wi-Fi IT Support Mobile Office Apps Vendor Two-factor Authentication Data Security Chrome BYOD Budget Mobile Device Management Gmail Apple App Employer-Employee Relationship Managed Services Networking Voice over Internet Protocol Avoiding Downtime Marketing Conferencing Access Control WiFi Tip of the week Computing HIPAA Information Technology How To Applications BDR Hacker Office 365 Analytics Office Tips Help Desk Augmented Reality Website Storage Virtual Private Network Password Bring Your Own Device Health Big Data Retail Operating System Router Managed IT Services Risk Management Healthcare Computers Free Resource Remote Monitoring Monitoring Vulnerability End of Support Project Management Windows 7 Vendor Management Microsoft 365 Physical Security Display Printer Solutions Firewall Telephone Paperless Office Infrastructure The Internet of Things Cooperation Document Management Going Green Social Cybercrime Windows 11 Scam Data loss 2FA Remote Workers Customer Service Excel Patch Management Save Money Outlook Smart Technology Money Images 101 Humor IT Management VPN Saving Time Mobility Meetings Multi-Factor Authentication Word Data Privacy Managed IT Service Sports Computer Repair Mouse Downloads Employees Administration Integration Licensing Safety Entertainment Machine Learning Holidays Data Storage Settings Telephone System Wireless Cost Management Printing Video Conferencing Content Filtering Maintenance Managed Services Provider Antivirus Professional Services YouTube Virtual Machines Customer Relationship Management Cryptocurrency Supply Chain Hacking Modem User Tip Processor iPhone Presentation Mobile Security Virtual Desktop LiFi Data storage Robot Vulnerabilities Wireless Technology Mirgation Supply Chain Management Technology Care IP Address Term Unified Threat Management Nanotechnology FinTech Halloween Business Communications IT Assessment Scams Unified Threat Management Addiction Language Recovery Chatbots Flexibility Hybrid Work Value Management Hard Drives Screen Reader Network Congestion Hacks Distributed Denial of Service Organization Scary Stories Human Resources Smart Devices Cables Fun User Error Domains Service Level Agreement Computing Infrastructure Digital Security Cameras Identity Deep Learning Remote Working Memory Google Apps Bookmark Google Play Point of Sale Refrigeration Smart Tech Data Breach Education Electronic Health Records IT Maintenance Public Speaking Download Alerts Videos Tech Support Business Intelligence Wasting Time Network Management Lithium-ion battery Shortcuts Browsers Security Cameras Connectivity Monitors Mobile Computing Entrepreneur Break Fix Trend Micro Software as a Service Ransmoware Search Upload Websites Best Practice Multi-Factor Security Vendors Managing Costs Social Network Be Proactive SSID Undo IoT Dark Web Buisness eCommerce IT solutions Surveillance Workforce SharePoint Virtual Assistant Trends Electronic Medical Records Legal Regulations Business Growth Google Calendar Threats Virtual Machine Customer Resource management Workplace Strategies Lenovo Data Analysis Medical IT Star Wars Writing Microsoft Excel Reviews Development Meta Cortana Transportation Gamification Virtual Reality Staff Private Cloud Application Social Networking Alt Codes Legislation Amazon Hypervisor Server Management Superfish Fileless Malware PowerPoint Identity Theft Shopping Downtime Optimization Hosted Solution Outsource IT Employer/Employee Relationships IBM Content Twitter Wearable Technology Error Motherboard Typing Comparison PCI DSS Environment Media Health IT Navigation Directions Assessment Social Engineering Permissions Gig Economy Internet Service Provider Small Businesses Knowledge Teamwork Remote Computing Google Drive Specifications Regulations Compliance Displays Evernote Memes 5G Microchip Tablet Competition Internet Exlporer Fraud Unified Communications Net Neutrality Outsourcing Experience SQL Server Username Alert Google Docs File Sharing Dark Data Bitcoin Black Friday Financial Data Running Cable History Managed IT IT Workplace Database How To Google Wallet Smartwatch Procurement Hiring/Firing Azure Notifications User IT Technicians Proxy Server Tech Travel Cookies Windows 8 Cyber Monday Telework Laptop Cyber security Paperless Communitications Co-managed IT Techology Google Maps Tactics Drones Hotspot CES

Blog Archive