Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google IT Services Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Smartphones VoIP Business Management communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Holiday Automation Artificial Intelligence Facebook Information Cloud Computing Gadgets Training Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Employer-Employee Relationship Managed Services Tip of the week Voice over Internet Protocol Chrome Budget Mobile Device Management Gmail Apple Networking App WiFi Applications Computing Information Technology Hacker Access Control Office 365 Conferencing Avoiding Downtime Marketing How To BDR HIPAA Router Operating System Virtual Private Network Risk Management 2FA Help Desk Computers Health Office Tips Analytics Website Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Remote Monitoring Social Vulnerability End of Support Vendor Management Cybercrime Physical Security Windows 11 Display Customer Service Monitoring Printer Paperless Office Infrastructure Excel Remote Workers Document Management Telephone Scam Firewall Cooperation Free Resource Project Management Data loss Windows 7 Microsoft 365 The Internet of Things Going Green Patch Management Solutions Save Money Settings Employees Printing Integration Wireless Content Filtering IT Management User Tip Modem VPN Mobile Security YouTube Meetings Processor Customer Relationship Management Cryptocurrency Holidays Computer Repair Data Storage Smart Technology Supply Chain Hacking Presentation Video Conferencing Virtual Desktop Data storage Managed Services Provider LiFi Professional Services Saving Time Virtual Machines Wireless Technology Outlook Managed IT Service Machine Learning Money Downloads Humor iPhone Word Licensing Maintenance Antivirus Vulnerabilities Sports Entertainment Mouse Data Privacy Images 101 Administration Mobility Safety Telephone System Multi-Factor Authentication Cost Management Robot Alt Codes Specifications Security Cameras Workplace Strategies Application Trend Micro Internet Exlporer Software as a Service Fraud Meta Downtime Unified Threat Management Microchip IBM Username Unified Threat Management Managing Costs Amazon Hosted Solution Typing Black Friday SSID eCommerce Database Surveillance Virtual Assistant Outsource IT Network Congestion Knowledge Google Drive User Error IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Cookies Competition Tactics Development Hotspot Transportation Small Businesses Point of Sale 5G Experience Google Docs Mirgation Hypervisor Displays Unified Communications Bitcoin Network Management PowerPoint Running Cable Tech Support Shopping Nanotechnology Optimization Addiction Google Wallet Language Employer/Employee Relationships Outsourcing Monitors Management PCI DSS User Chatbots Navigation Windows 8 Distributed Denial of Service Workplace Laptop Websites Gig Economy Screen Reader Service Level Agreement Internet Service Provider Drones Computing Infrastructure Teamwork Hiring/Firing Electronic Medical Records IP Address Regulations Compliance SharePoint Identity Evernote Paperless Smart Tech Memes Co-managed IT Halloween Bookmark Download Net Neutrality Lenovo Alerts SQL Server Technology Care Writing Business Communications Virtual Reality Financial Data Recovery History Hard Drives Connectivity IT Hacks Server Management Break Fix Scams Scary Stories Private Cloud Browsers Smartwatch Domains Upload Procurement Superfish Azure Hybrid Work Identity Theft Fun Multi-Factor Security Tech Human Resources Twitter Social Network Telework Cyber security Deep Learning Refrigeration IoT Communitications Dark Web Cables Error CES Public Speaking Trends Supply Chain Management Education Social Engineering Google Calendar Term Google Apps Remote Computing Lithium-ion battery Customer Resource management FinTech Regulations Star Wars IT Assessment Mobile Computing Entrepreneur Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Staff Value Business Intelligence Tablet Search Legislation Shortcuts Alert Organization Social Networking Best Practice Undo Smart Devices Managed IT Ransmoware Buisness File Sharing Dark Data Fileless Malware Digital Security Cameras Content Remote Working Legal Wearable Technology Memory Vendors IT solutions How To Comparison Google Play Be Proactive Notifications Health IT Motherboard Data Breach Business Growth Assessment Electronic Health Records Permissions Workforce Travel Directions Videos Techology Wasting Time Threats Google Maps Cortana

Blog Archive