Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Privacy IT Support Phishing Email Workplace Tips Google Computer Workplace Strategy Backup Small Business Hosted Solutions Collaboration Managed Service Ransomware Users AI Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Holiday Facebook Automation Artificial Intelligence Covid-19 Training Gadgets Compliance Cloud Computing Remote Work IT Support Outsourced IT Server Managed Service Provider Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Vendor Windows 10 Business Technology Virtualization Bandwidth Blockchain Two-factor Authentication Managed Services Apps Data Security Mobile Office Mobile Device Management Gmail WiFi Tip of the week Chrome Budget Employer-Employee Relationship Voice over Internet Protocol Apple Networking App BYOD Computing Physical Security Applications Information Technology Access Control Office 365 Conferencing Password Managed IT Services How To Hacker BDR Avoiding Downtime Marketing HIPAA Router Risk Management Virtual Private Network Health Help Desk 2FA Analytics Office Tips Big Data Augmented Reality Retail Storage Healthcare Bring Your Own Device Computers Website Operating System Solutions Firewall Display Printer Paperless Office Infrastructure Windows 11 Monitoring The Internet of Things Document Management Social Excel Managed IT Service Remote Workers Telephone Scam Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Vendor Management Cybercrime YouTube Meetings VPN Employees Cryptocurrency Modem Integration User Tip Processor Computer Repair Mobile Security Virtual Desktop Safety Data storage LiFi Holidays Smart Technology Outlook Data Storage Supply Chain Machine Learning Video Conferencing Saving Time Money Managed Services Provider Humor Virtual Machines Professional Services Maintenance Downloads Antivirus Sports Customer Relationship Management Mouse Licensing iPhone Administration Hacking Entertainment Presentation Vulnerabilities Data Privacy Wireless Technology Robot Images 101 Telephone System Cost Management Multi-Factor Authentication Mobility Settings Wireless Printing Content Filtering Word IT Management Network Congestion Specifications Videos Electronic Health Records Workforce Wasting Time Threats Microchip Google Drive User Error Internet Exlporer Knowledge Fraud Refrigeration Trend Micro Security Cameras Workplace Strategies Username Public Speaking Point of Sale Lithium-ion battery 5G Black Friday Software as a Service Meta Managing Costs Amazon Google Docs Database Unified Communications Experience Entrepreneur eCommerce SSID Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Monitors Cyber Monday Surveillance Virtual Assistant Outsource IT Proxy Server Google Wallet Virtual Machine Environment Media Tactics Hotspot Undo Reviews Medical IT Windows 8 Laptop Websites Mirgation Nanotechnology Development Transportation Small Businesses Drones Hypervisor Displays SharePoint Addiction Electronic Medical Records Language Shopping Optimization PowerPoint Management Halloween Chatbots Screen Reader Writing Distributed Denial of Service Application Employer/Employee Relationships Outsourcing Lenovo Navigation Service Level Agreement Virtual Reality Computing Infrastructure PCI DSS Gig Economy Workplace Hacks Server Management Scary Stories Private Cloud Identity IBM Smart Tech Identity Theft Fun Internet Service Provider Teamwork Hiring/Firing Bookmark Superfish Evernote Paperless Download Deep Learning Twitter Alerts Regulations Compliance Memes Co-managed IT Error Connectivity Education Social Engineering Break Fix Net Neutrality SQL Server Technology Care Browsers History Business Communications Upload Remote Computing Competition Financial Data Multi-Factor Security Smartwatch IT Scams Social Network Mobile Computing IoT Tablet Search Dark Web Procurement Azure Hybrid Work Cyber security Tech Human Resources Trends Best Practice Alert Telework Dark Data Google Calendar User CES Communitications Cables Customer Resource management Managed IT Buisness File Sharing Regulations Star Wars IT solutions How To Microsoft Excel Supply Chain Management Data Analysis Legal Term Google Apps Gamification Business Growth Notifications Staff FinTech Legislation IT Assessment IT Maintenance Travel Social Networking IP Address Fileless Malware Techology Google Maps Cortana Flexibility Value Business Intelligence Organization Shortcuts Content Alt Codes Wearable Technology Motherboard Downtime Unified Threat Management Comparison Recovery Digital Security Cameras Smart Devices Ransmoware Health IT Memory Vendors Directions Unified Threat Management Assessment Hosted Solution Permissions Hard Drives Remote Working Data Breach Google Play Be Proactive Typing Domains

Blog Archive