Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Ransomware Mobile Device Managed Service Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Information Holiday Miscellaneous Artificial Intelligence Automation Cloud Computing Training Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain Wi-Fi Virtualization Business Technology Bandwidth Data Security Vendor Two-factor Authentication Apps Mobile Office Mobile Device Management Gmail BYOD WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome Tip of the week Budget Apple App Networking How To BDR Computing Information Technology HIPAA Applications Office 365 Access Control Hacker Conferencing Avoiding Downtime Marketing Operating System 2FA Risk Management Router Physical Security Big Data Virtual Private Network Healthcare Analytics Office Tips Health Augmented Reality Help Desk Computers Storage Password Bring Your Own Device Retail Website Managed IT Services Going Green Cooperation Firewall Patch Management Windows 11 Save Money Cybercrime Remote Monitoring Vulnerability End of Support Vendor Management The Internet of Things Excel Social Remote Workers Display Printer Paperless Office Infrastructure Monitoring Customer Service Free Resource Project Management Windows 7 Document Management Microsoft 365 Telephone Scam Solutions Data loss Settings Printing Wireless Holidays Telephone System Robot Content Filtering Cost Management YouTube Safety Data Storage Supply Chain Video Conferencing Cryptocurrency IT Management Managed Services Provider Virtual Machines VPN Professional Services Meetings Virtual Desktop User Tip Data storage Modem LiFi Computer Repair Mobile Security Processor Outlook iPhone Customer Relationship Management Money Humor Vulnerabilities Smart Technology Data Privacy Machine Learning Hacking Images 101 Presentation Saving Time Sports Multi-Factor Authentication Mouse Mobility Wireless Technology Managed IT Service Maintenance Antivirus Administration Downloads Licensing Employees Entertainment Word Integration Alert Managing Costs Amazon Trends Refrigeration eCommerce Managed IT Customer Resource management SSID File Sharing Regulations Dark Data Google Calendar Cortana Public Speaking Surveillance Data Analysis Virtual Assistant Outsource IT Star Wars Alt Codes How To Microsoft Excel Gamification Media Notifications Staff Downtime Lithium-ion battery Virtual Machine Environment Entrepreneur Medical IT Travel Social Networking Hosted Solution Legislation Reviews Development Techology Fileless Malware Transportation Small Businesses Google Maps Typing Content Wearable Technology Hypervisor Displays Undo Optimization Health IT Google Drive PowerPoint Unified Threat Management Motherboard Comparison Knowledge Shopping Permissions Unified Threat Management Directions Employer/Employee Relationships Outsourcing Assessment Navigation 5G PCI DSS Gig Economy Google Docs Workplace Unified Communications Network Congestion Specifications Experience Fraud Running Cable Internet Service Provider User Error Microchip Teamwork Hiring/Firing Internet Exlporer Bitcoin Username Google Wallet Evernote Paperless Regulations Compliance Application Memes Co-managed IT Point of Sale Black Friday Laptop IBM Net Neutrality SQL Server Technology Care Database Windows 8 History Network Management Drones Business Communications Tech Support IT Technicians Financial Data Smartwatch IT Proxy Server Scams Cookies Monitors Cyber Monday Hotspot Halloween Procurement Azure Hybrid Work Tactics Cyber security Tech Human Resources Websites Mirgation Telework CES Competition Communitications Cables Nanotechnology Electronic Medical Records Language Scary Stories Supply Chain Management SharePoint Addiction Hacks Management Term Google Apps Chatbots Fun FinTech IT Assessment Lenovo IT Maintenance Screen Reader Deep Learning Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Flexibility User Value Business Intelligence Service Level Agreement Server Management Shortcuts Private Cloud Identity Education Organization Digital Security Cameras Smart Devices Superfish Bookmark Ransmoware Identity Theft Smart Tech Mobile Computing Twitter Alerts IP Address Remote Working Memory Vendors Download Data Breach Google Play Be Proactive Error Search Videos Electronic Health Records Browsers Workforce Connectivity Best Practice Social Engineering Break Fix Remote Computing Buisness Recovery Wasting Time Threats Upload Trend Micro Social Network Legal Security Cameras Workplace Strategies IT solutions Multi-Factor Security Hard Drives Domains Software as a Service Meta Tablet IoT Business Growth Dark Web

Blog Archive