Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Cloud Computing Gadgets Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Vendor Apps Two-factor Authentication Mobile Office Managed Services App WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail BDR Computing HIPAA Physical Security Information Technology Applications Access Control Hacker Office 365 Avoiding Downtime Marketing Conferencing Managed IT Services How To Big Data Operating System Router Virtual Private Network Risk Management Health Computers Analytics 2FA Office Tips Help Desk Augmented Reality Website Retail Storage Password Bring Your Own Device Healthcare Cooperation Free Resource Project Management Windows 7 The Internet of Things Going Green Patch Management Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Social Vendor Management Cybercrime Solutions Display Printer Customer Service Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Managed IT Service Remote Workers Scam Telephone Data loss Firewall Safety Data Privacy Robot Images 101 Telephone System Multi-Factor Authentication Mobility Settings Wireless Cost Management Printing Content Filtering IT Management VPN YouTube Meetings Employees Cryptocurrency Integration Customer Relationship Management Computer Repair User Tip Modem Mobile Security Virtual Desktop Processor Data storage Hacking LiFi Holidays Presentation Data Storage Outlook Machine Learning Wireless Technology Smart Technology Supply Chain Video Conferencing Money Humor Managed Services Provider Professional Services Saving Time Virtual Machines Maintenance Word Sports Antivirus Mouse Downloads iPhone Licensing Administration Vulnerabilities Entertainment Trends Supply Chain Management Legal IT solutions How To Customer Resource management FinTech Regulations Undo Business Growth Google Calendar Term Google Apps Notifications Microsoft Excel IT Maintenance Travel Data Analysis Star Wars IT Assessment Gamification Flexibility Techology Staff Value Business Intelligence Google Maps Cortana Organization Social Networking Alt Codes Legislation Shortcuts Ransmoware Downtime Unified Threat Management Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Unified Threat Management Wearable Technology Memory Vendors Application Hosted Solution Health IT Motherboard Data Breach Typing Comparison Google Play Be Proactive Permissions Workforce Network Congestion Directions Videos Assessment Electronic Health Records IBM Google Drive User Error Wasting Time Threats Knowledge Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Point of Sale 5G Microchip Internet Exlporer Software as a Service Username Google Docs Managing Costs Amazon Unified Communications Experience Running Cable Tech Support eCommerce Competition Bitcoin Network Management Black Friday SSID Google Wallet Virtual Assistant Outsource IT Monitors Database Surveillance IT Technicians Virtual Machine Environment Media Laptop Websites Proxy Server Reviews Cookies Windows 8 Cyber Monday Medical IT Drones Hotspot Transportation Small Businesses User Tactics Development SharePoint Mirgation Hypervisor Displays Electronic Medical Records Halloween Shopping Nanotechnology Optimization PowerPoint Addiction IP Address Lenovo Language Employer/Employee Relationships Outsourcing Writing Management PCI DSS Chatbots Navigation Virtual Reality Distributed Denial of Service Workplace Scary Stories Private Cloud Gig Economy Screen Reader Hacks Server Management Service Level Agreement Internet Service Provider Superfish Computing Infrastructure Teamwork Hiring/Firing Recovery Identity Theft Fun Regulations Compliance Identity Hard Drives Deep Learning Evernote Paperless Twitter Co-managed IT Error Bookmark Smart Tech Memes Domains Download Net Neutrality Alerts SQL Server Technology Care Education Social Engineering Financial Data History Refrigeration Business Communications Remote Computing Break Fix Scams Browsers Smartwatch Connectivity IT Public Speaking Mobile Computing Upload Procurement Lithium-ion battery Azure Hybrid Work Tablet Search Social Network Telework Cyber security Best Practice Multi-Factor Security Tech Human Resources Entrepreneur Alert Dark Web Cables Buisness File Sharing Dark Data CES IoT Communitications Managed IT

Blog Archive