Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Ransomware Backup Small Business Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery AI Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Holiday Information Automation Cloud Computing Gadgets Training Covid-19 Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Mobile Office Data Security Apps Vendor Two-factor Authentication Chrome Budget Mobile Device Management Managed Services Networking Voice over Internet Protocol Gmail Apple App WiFi BYOD Employer-Employee Relationship Tip of the week Avoiding Downtime Marketing Conferencing How To BDR Computing HIPAA Information Technology Access Control Applications Hacker Office 365 Analytics Office Tips Website 2FA Augmented Reality Help Desk Retail Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Physical Security Virtual Private Network Risk Management Router Health Computers Document Management Windows 11 Monitoring Excel Scam Data loss Firewall Remote Workers Telephone Patch Management The Internet of Things Save Money Cooperation Free Resource Remote Monitoring Going Green Vulnerability Project Management End of Support Social Windows 7 Vendor Management Microsoft 365 Cybercrime Display Printer Solutions Paperless Office Customer Service Infrastructure Outlook Holidays Data Storage Money Humor Smart Technology Supply Chain Video Conferencing Maintenance Managed Services Provider Word Antivirus Saving Time Virtual Machines Professional Services Sports Mouse Managed IT Service Administration Downloads Safety iPhone Licensing Robot Entertainment Vulnerabilities Data Privacy Images 101 Settings Wireless IT Management Printing Telephone System VPN Multi-Factor Authentication Meetings Mobility Content Filtering Cost Management YouTube Customer Relationship Management Cryptocurrency Computer Repair Employees Hacking Integration Virtual Desktop Presentation User Tip Data storage Modem LiFi Processor Mobile Security Machine Learning Wireless Technology Proxy Server Reviews Lenovo Cookies IP Address Cyber Monday Medical IT Writing Tactics Development Hotspot Transportation Small Businesses Virtual Reality Halloween Mirgation Hypervisor Displays Private Cloud Server Management Shopping Superfish Nanotechnology Optimization Identity Theft PowerPoint Recovery Hard Drives Addiction Hacks Language Employer/Employee Relationships Outsourcing Twitter Scary Stories Chatbots Error Domains Navigation Fun Management PCI DSS Gig Economy Screen Reader Deep Learning Distributed Denial of Service Workplace Social Engineering Refrigeration Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Remote Computing Identity Education Public Speaking Evernote Paperless Regulations Compliance Bookmark Smart Tech Memes Tablet Lithium-ion battery Co-managed IT Alert Entrepreneur Download Net Neutrality Mobile Computing Alerts SQL Server Technology Care Financial Data Managed IT History File Sharing Business Communications Dark Data Search Browsers Smartwatch Connectivity IT Best Practice Break Fix Scams How To Azure Hybrid Work Notifications Buisness Undo Upload Procurement Social Network Telework Legal Cyber security Travel IT solutions Multi-Factor Security Tech Human Resources CES Techology IoT Communitications Google Maps Business Growth Dark Web Cables Trends Supply Chain Management Customer Resource management FinTech Regulations Unified Threat Management Google Calendar Term Google Apps Cortana Application Data Analysis Unified Threat Management Star Wars IT Assessment Alt Codes Microsoft Excel IT Maintenance Staff Value Business Intelligence Downtime Gamification Flexibility Organization Social Networking Hosted Solution IBM Legislation Shortcuts Network Congestion Fileless Malware Digital Security Cameras User Error Smart Devices Typing Ransmoware Wearable Technology Memory Vendors Content Remote Working Health IT Google Drive Motherboard Data Breach Point of Sale Comparison Google Play Be Proactive Knowledge Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Tech Support Competition 5G Network Management Google Docs Trend Micro Unified Communications Specifications Security Cameras Workplace Strategies Monitors Experience Microchip Internet Exlporer Software as a Service Bitcoin Fraud Meta Running Cable Managing Costs Amazon Websites Username Google Wallet eCommerce Black Friday SSID User SharePoint Database Surveillance Windows 8 Virtual Assistant Outsource IT Electronic Medical Records Laptop IT Technicians Virtual Machine Environment Media Drones

Blog Archive