Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management Smartphones AI communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Information Cloud Computing Holiday Miscellaneous Gadgets Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Virtualization Wi-Fi Business Technology Blockchain Bandwidth Data Security Apps Two-factor Authentication Vendor Mobile Office Gmail App Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Tip of the week Chrome Budget Networking Mobile Device Management Apple BDR WiFi Conferencing Computing Information Technology Access Control Office 365 Hacker Avoiding Downtime HIPAA Marketing Applications How To Help Desk Healthcare Operating System Big Data Virtual Private Network Risk Management Health Analytics Office Tips Computers Augmented Reality Retail Storage Website Router Password Bring Your Own Device Managed IT Services 2FA Firewall Excel Monitoring Patch Management Save Money Remote Monitoring Going Green End of Support Remote Workers Vulnerability Vendor Management The Internet of Things Physical Security Cybercrime Social Telephone Display Printer Free Resource Project Management Paperless Office Windows 7 Infrastructure Cooperation Microsoft 365 Customer Service Document Management Solutions Scam Data loss Windows 11 Video Conferencing Managed Services Provider Robot Virtual Machines Professional Services Smart Technology Safety Saving Time Settings Wireless IT Management Printing Content Filtering VPN Meetings iPhone Managed IT Service YouTube Vulnerabilities Downloads Data Privacy Cryptocurrency Computer Repair Licensing Images 101 Entertainment Customer Relationship Management Virtual Desktop Multi-Factor Authentication Mobility Data storage LiFi Hacking Machine Learning Outlook Telephone System Presentation Cost Management Employees Money Humor Integration Wireless Technology Maintenance Antivirus Sports Holidays Mouse User Tip Modem Word Mobile Security Data Storage Processor Administration Supply Chain Outsourcing Employer/Employee Relationships Proxy Server Best Practice How To Public Speaking Cookies Cyber Monday Hotspot PCI DSS Notifications Navigation Lithium-ion battery Tactics Buisness IT solutions Mirgation Entrepreneur Gig Economy Workplace Legal Travel Hiring/Firing Google Maps Teamwork Business Growth Nanotechnology Techology Internet Service Provider Language Regulations Compliance Paperless Evernote Addiction Management Undo Chatbots Cortana Memes Co-managed IT Unified Threat Management Technology Care SQL Server Alt Codes Screen Reader Distributed Denial of Service Unified Threat Management Net Neutrality Computing Infrastructure Financial Data History Business Communications Service Level Agreement Downtime Hosted Solution Network Congestion Identity Smartwatch IT Scams User Error Procurement Hybrid Work Azure Bookmark Typing Smart Tech Application Alerts Telework Cyber security Human Resources Tech Download Point of Sale Knowledge CES Communitications Cables Google Drive Supply Chain Management Browsers IBM Connectivity Break Fix 5G FinTech Network Management Google Apps Tech Support Term Upload Google Docs Social Network Unified Communications Monitors Experience Multi-Factor Security IT Assessment IT Maintenance Flexibility Business Intelligence Value Bitcoin IoT Running Cable Dark Web Trends Organization Shortcuts Google Wallet Websites Customer Resource management Competition Regulations Digital Security Cameras Google Calendar Smart Devices Ransmoware Microsoft Excel SharePoint Remote Working Vendors Memory Data Analysis Windows 8 Electronic Medical Records Star Wars Laptop Gamification Staff Data Breach Be Proactive Drones Google Play Writing Social Networking Videos Legislation Lenovo Electronic Health Records Workforce Threats Wasting Time Fileless Malware Virtual Reality Halloween User Content Wearable Technology Server Management Trend Micro Workplace Strategies Private Cloud Security Cameras Identity Theft Health IT Motherboard Comparison Superfish Software as a Service Meta Permissions Amazon Managing Costs Directions Hacks Twitter IP Address Assessment Scary Stories Fun eCommerce Error SSID Virtual Assistant Deep Learning Social Engineering Specifications Surveillance Outsource IT Fraud Environment Virtual Machine Media Microchip Remote Computing Internet Exlporer Recovery Username Education Hard Drives Reviews Medical IT Small Businesses Tablet Transportation Domains Black Friday Development Displays Hypervisor Mobile Computing Alert Database Dark Data Refrigeration IT Technicians Search Shopping Managed IT Optimization File Sharing PowerPoint

Blog Archive