Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android Disaster Recovery AI Data Recovery Upgrade Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Automation Facebook Information Miscellaneous Artificial Intelligence Gadgets Training Covid-19 Cloud Computing Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Wi-Fi Windows 10 Blockchain Virtualization Apps Mobile Office Data Security Two-factor Authentication Vendor Budget Employer-Employee Relationship Apple Tip of the week App Mobile Device Management Networking Gmail Managed Services Voice over Internet Protocol WiFi BYOD Chrome Access Control Hacker Conferencing Avoiding Downtime Marketing Computing How To Information Technology BDR Office 365 HIPAA Applications Virtual Private Network Storage Password Health Bring Your Own Device Help Desk 2FA Computers Retail Website Operating System Managed IT Services Risk Management Healthcare Analytics Office Tips Router Big Data Augmented Reality Free Resource Project Management Display Printer Windows 7 Monitoring Paperless Office Microsoft 365 Infrastructure Windows 11 Customer Service Solutions Document Management Excel Going Green Telephone Scam Cybercrime Data loss Cooperation Firewall Patch Management Save Money Remote Workers Remote Monitoring The Internet of Things Vulnerability End of Support Vendor Management Social Physical Security Mobile Security Processor Computer Repair Images 101 Sports Customer Relationship Management Multi-Factor Authentication Mobility Mouse Smart Technology Hacking Administration Presentation Saving Time Machine Learning Supply Chain Employees Wireless Technology Integration Managed IT Service Downloads Settings Maintenance Antivirus Licensing Printing Wireless Content Filtering Holidays Entertainment Word YouTube Data Storage Cryptocurrency Video Conferencing Managed Services Provider Telephone System Virtual Machines Professional Services Data Privacy Cost Management Robot Virtual Desktop Safety LiFi Data storage iPhone Outlook IT Management VPN Meetings Money User Tip Modem Vulnerabilities Humor Hacks Workplace Strategies Scary Stories IBM Supply Chain Management Database Fun IT Technicians Term Point of Sale Meta FinTech Deep Learning Proxy Server IT Assessment Cookies Amazon Cyber Monday Network Management Hotspot Tech Support Flexibility Tactics Value Organization Mirgation Outsource IT Monitors Education Media Digital Security Cameras Competition Smart Devices Nanotechnology Environment Memory Language Websites Mobile Computing Remote Working Addiction Search Management Data Breach Chatbots Google Play Small Businesses Electronic Medical Records Best Practice Videos Electronic Health Records SharePoint Screen Reader Displays Distributed Denial of Service Wasting Time Computing Infrastructure Buisness User Service Level Agreement Trend Micro Lenovo Identity Security Cameras Legal Outsourcing Writing IT solutions Virtual Reality Business Growth Bookmark Software as a Service Smart Tech Download Managing Costs Server Management Alerts Private Cloud Workplace IP Address Cortana eCommerce Superfish SSID Identity Theft Hiring/Firing Break Fix Twitter Alt Codes Paperless Browsers Surveillance Connectivity Virtual Assistant Upload Virtual Machine Error Co-managed IT Downtime Recovery Reviews Hard Drives Social Network Medical IT Technology Care Multi-Factor Security Social Engineering Hosted Solution Dark Web Remote Computing Typing Business Communications Domains Development IoT Transportation Trends Hypervisor Scams Shopping Knowledge Refrigeration Customer Resource management Optimization Regulations PowerPoint Tablet Google Drive Hybrid Work Google Calendar Microsoft Excel Alert Human Resources Public Speaking Data Analysis Star Wars Employer/Employee Relationships Gamification Managed IT Staff Navigation File Sharing Cables Dark Data Lithium-ion battery PCI DSS 5G Gig Economy Experience Entrepreneur Social Networking Google Docs Legislation How To Unified Communications Notifications Bitcoin Google Apps Running Cable Fileless Malware Internet Service Provider Teamwork Content Wearable Technology Evernote Travel Google Wallet IT Maintenance Regulations Compliance Undo Health IT Memes Techology Motherboard Google Maps Business Intelligence Comparison Permissions Windows 8 Shortcuts Laptop Directions Net Neutrality Assessment SQL Server History Unified Threat Management Drones Ransmoware Financial Data Smartwatch IT Unified Threat Management Vendors Specifications Fraud Be Proactive Halloween Microchip Procurement Internet Exlporer Azure Application Username Cyber security Tech Workforce Network Congestion Telework CES Communitications User Error Threats Black Friday

Blog Archive