Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Data Recovery Android Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Facebook Miscellaneous Holiday Automation Covid-19 Cloud Computing Gadgets Training Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Blockchain Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Mobile Office Vendor Data Security Apps Two-factor Authentication Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Avoiding Downtime HIPAA Marketing Applications How To BDR Conferencing Computing Information Technology Access Control Office 365 Hacker Analytics Office Tips Augmented Reality Website Retail Router Storage Password Bring Your Own Device Managed IT Services 2FA Help Desk Big Data Operating System Healthcare Risk Management Virtual Private Network Health Computers Microsoft 365 Document Management Solutions Scam Data loss Firewall Windows 11 Monitoring The Internet of Things Going Green Patch Management Excel Save Money Remote Monitoring End of Support Vulnerability Social Vendor Management Remote Workers Cybercrime Physical Security Telephone Display Printer Paperless Office Customer Service Cooperation Free Resource Project Management Infrastructure Windows 7 Telephone System Multi-Factor Authentication Outlook Mobility Machine Learning Wireless Technology Cost Management Money Humor Employees Maintenance Sports Word Integration Antivirus Mouse User Tip Modem Processor Mobile Security Administration Holidays Safety Data Storage Smart Technology Supply Chain Robot Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Settings Wireless Printing Content Filtering Managed IT Service IT Management YouTube Meetings VPN Downloads iPhone Cryptocurrency Customer Relationship Management Licensing Computer Repair Entertainment Vulnerabilities Virtual Desktop Data Privacy Hacking Data storage LiFi Images 101 Presentation Organization Social Networking SharePoint Legislation Shortcuts Electronic Medical Records Halloween Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Lenovo Writing IP Address Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Virtual Reality Scary Stories Private Cloud Directions Videos Assessment Electronic Health Records Permissions Workforce Hacks Server Management Wasting Time Threats Superfish Identity Theft Fun Recovery Hard Drives Trend Micro Specifications Security Cameras Workplace Strategies Deep Learning Twitter Error Microchip Domains Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Education Social Engineering Username Refrigeration eCommerce Black Friday SSID Remote Computing Public Speaking Database Surveillance Virtual Assistant Outsource IT Mobile Computing IT Technicians Virtual Machine Environment Media Tablet Search Lithium-ion battery Proxy Server Reviews Cookies Entrepreneur Cyber Monday Medical IT Best Practice Alert Buisness File Sharing Dark Data Tactics Development Hotspot Transportation Small Businesses Managed IT Mirgation Hypervisor Displays Legal IT solutions How To Shopping Undo Nanotechnology Optimization PowerPoint Business Growth Notifications Travel Addiction Language Employer/Employee Relationships Outsourcing Chatbots Techology Navigation Google Maps Cortana Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Alt Codes Downtime Unified Threat Management Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Application Identity Unified Threat Management Evernote Paperless Hosted Solution Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Typing Network Congestion IBM Download Net Neutrality Alerts SQL Server Technology Care History Google Drive User Error Business Communications Knowledge Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Point of Sale 5G Upload Procurement Azure Hybrid Work Cyber security Google Docs Multi-Factor Security Tech Human Resources Unified Communications Experience Social Network Telework CES Competition IoT Communitications Dark Web Cables Bitcoin Network Management Running Cable Tech Support Monitors Trends Supply Chain Management Google Wallet Customer Resource management FinTech Regulations Google Calendar Term Google Apps Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Windows 8 Laptop Websites Staff Value Business Intelligence Drones Gamification Flexibility User

Blog Archive