Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone Data Recovery AI Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Training Gadgets Covid-19 Cloud Computing Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Wi-Fi Virtualization Blockchain Bandwidth Two-factor Authentication Apps Data Security Mobile Office Vendor App Gmail WiFi Managed Services Tip of the week Voice over Internet Protocol Employer-Employee Relationship Networking Chrome Budget BYOD Apple Mobile Device Management Access Control Computing Conferencing Information Technology Office 365 How To Hacker BDR Avoiding Downtime HIPAA Marketing Applications Virtual Private Network 2FA Health Help Desk Operating System Big Data Healthcare Risk Management Retail Office Tips Analytics Managed IT Services Computers Augmented Reality Storage Password Website Bring Your Own Device Router Firewall Display Going Green Windows 11 Printer Monitoring Paperless Office Infrastructure The Internet of Things Cybercrime Excel Remote Workers Document Management Social Telephone Scam Free Resource Data loss Project Management Customer Service Windows 7 Cooperation Microsoft 365 Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Mobile Security Holidays Processor Computer Repair Data Storage Video Conferencing Settings Safety Smart Technology Printing Supply Chain Managed Services Provider Wireless Content Filtering Professional Services Virtual Machines YouTube Saving Time Machine Learning Cryptocurrency Managed IT Service iPhone Downloads Virtual Desktop Maintenance Customer Relationship Management Antivirus Vulnerabilities Licensing Data storage LiFi Entertainment Outlook Images 101 Data Privacy Hacking Mobility Money Multi-Factor Authentication Presentation Humor Telephone System Cost Management Wireless Technology Robot Sports Mouse Employees Integration IT Management Word Administration VPN Meetings User Tip Modem Medical IT Database Legal Reviews IT solutions Outsource IT Public Speaking Environment Development Lithium-ion battery Media Transportation Point of Sale IT Technicians Business Growth Cyber Monday Hypervisor Proxy Server Cookies Entrepreneur Network Management PowerPoint Tactics Tech Support Hotspot Shopping Small Businesses Optimization Cortana Alt Codes Displays Employer/Employee Relationships Mirgation Monitors PCI DSS Downtime Undo Navigation Nanotechnology Addiction Websites Language Gig Economy Hosted Solution Outsourcing Typing Internet Service Provider Teamwork Management Chatbots Screen Reader Electronic Medical Records Distributed Denial of Service Regulations Compliance Workplace SharePoint Evernote Memes Knowledge Service Level Agreement Computing Infrastructure Google Drive Hiring/Firing Net Neutrality Paperless Lenovo SQL Server Application Identity Writing Smart Tech Virtual Reality Financial Data Co-managed IT History Bookmark 5G IT Experience IBM Server Management Download Private Cloud Alerts Google Docs Smartwatch Unified Communications Technology Care Bitcoin Procurement Running Cable Business Communications Superfish Azure Identity Theft Tech Connectivity Twitter Break Fix Google Wallet Telework Scams Cyber security Browsers Communitications Upload Error CES Hybrid Work Multi-Factor Security Windows 8 Supply Chain Management Laptop Human Resources Social Network Social Engineering Term IoT Remote Computing Dark Web Drones FinTech Cables Competition IT Assessment Trends Google Calendar Flexibility Halloween Google Apps Value Customer Resource management Tablet Regulations Star Wars Alert Microsoft Excel Organization IT Maintenance Data Analysis Smart Devices Managed IT Gamification User File Sharing Staff Dark Data Digital Security Cameras Business Intelligence How To Legislation Hacks Remote Working Scary Stories Shortcuts Memory Social Networking Google Play Notifications Ransmoware Data Breach Fileless Malware Fun Electronic Health Records IP Address Content Travel Wearable Technology Videos Deep Learning Vendors Comparison Be Proactive Techology Wasting Time Health IT Google Maps Motherboard Security Cameras Assessment Permissions Education Workforce Trend Micro Directions Threats Software as a Service Recovery Unified Threat Management Specifications Mobile Computing Workplace Strategies Unified Threat Management Managing Costs Hard Drives SSID Internet Exlporer Fraud Meta eCommerce Microchip Search Domains Amazon Surveillance Virtual Assistant Username Network Congestion Best Practice Black Friday Buisness User Error Virtual Machine Refrigeration

Blog Archive