Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Small Business Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Upgrade Managed Service Mobile Devices communications Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Remote Network Tech Term Internet of Things Current Events Artificial Intelligence Facebook Automation Productivity Cloud Computing Covid-19 Gadgets AI Remote Work Miscellaneous Server Managed Service Provider Information Holiday Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Compliance Data Management Business Continuity Government Training Windows 10 Blockchain Bandwidth Virtualization Business Technology Wi-Fi Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget BYOD Vendor Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking How To IT Support BDR WiFi Applications Access Control Tip of the week Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 Office Tips Analytics Augmented Reality Storage Password Bring Your Own Device HIPAA Router Big Data Virtual Private Network Health Help Desk Operating System Computers Risk Management Retail Healthcare Website Managed IT Services Cooperation Free Resource 2FA Project Management Firewall Windows 7 Excel Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions The Internet of Things Physical Security Social Display Printer Going Green Paperless Office Infrastructure Monitoring Customer Service Cybercrime Document Management Remote Workers Telephone Scam Data loss Windows 11 Outlook Supply Chain Money Images 101 Humor Telephone System Multi-Factor Authentication Robot Mobility Cost Management Safety Sports Mouse IT Management VPN Employees Meetings Integration Administration User Tip Modem Computer Repair Mobile Security Data Privacy Processor Holidays Customer Relationship Management Data Storage Settings Printing Wireless Smart Technology Content Filtering Video Conferencing Hacking Machine Learning Managed Services Provider Presentation Saving Time YouTube Virtual Machines Professional Services Cryptocurrency Wireless Technology Managed IT Service Maintenance Antivirus Downloads Virtual Desktop iPhone Licensing Data storage LiFi Entertainment Word Vulnerabilities Alert Displays Trends Supply Chain Management Refrigeration Managed IT Customer Resource management FinTech Halloween File Sharing Regulations Dark Data Google Calendar Term Outsourcing Public Speaking Data Analysis Star Wars IT Assessment How To Microsoft Excel Gamification Flexibility Notifications Staff Value Lithium-ion battery Workplace Hacks Organization Entrepreneur Scary Stories Travel Social Networking Legislation Hiring/Firing Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Fun Content Remote Working Wearable Technology Memory Paperless Deep Learning Co-managed IT Undo Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Permissions Technology Care Unified Threat Management Directions Videos Education Assessment Electronic Health Records Wasting Time Business Communications Scams Mobile Computing Trend Micro Network Congestion Specifications Security Cameras Search Fraud Hybrid Work User Error Microchip Internet Exlporer Software as a Service Application Best Practice Username Managing Costs Human Resources Cables Buisness Point of Sale eCommerce Black Friday SSID Virtual Assistant IBM Legal IT solutions Database Surveillance Business Growth Network Management Tech Support IT Technicians Virtual Machine Google Apps IT Maintenance Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Cortana Hotspot Transportation Business Intelligence Tactics Development Alt Codes Websites Mirgation Hypervisor Shortcuts Ransmoware Competition Shopping Downtime Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Vendors SharePoint Hosted Solution Addiction Typing Management PCI DSS Chatbots Navigation Be Proactive Workforce Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Knowledge Virtual Reality Computing Infrastructure Teamwork Threats Google Drive User Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Evernote Workplace Strategies Meta Superfish Bookmark Identity Theft Smart Tech Memes 5G Experience Twitter Alerts SQL Server Amazon IP Address Google Docs Unified Communications Download Net Neutrality Bitcoin Financial Data Running Cable Error History Outsource IT Google Wallet Browsers Smartwatch Connectivity IT Social Engineering Break Fix Remote Computing Azure Environment Media Recovery Upload Procurement Hard Drives Windows 8 Social Network Telework Laptop Cyber security Multi-Factor Security Tech Small Businesses Domains Drones CES Tablet IoT Communitications Dark Web

Blog Archive