Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android Upgrade AI Data Recovery Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Gmail Budget Networking Apple App BYOD Employer-Employee Relationship Managed Services Voice over Internet Protocol Tip of the week Mobile Device Management How To BDR WiFi HIPAA Applications Computing Hacker Access Control Information Technology Avoiding Downtime Marketing Conferencing Office 365 Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data 2FA Router Virtual Private Network Operating System Healthcare Computers Health Risk Management Help Desk Website Retail Office Tips Analytics Solutions Firewall Scam Data loss Cooperation The Internet of Things Windows 11 Patch Management Save Money Social Remote Monitoring Vulnerability End of Support Vendor Management Excel Going Green Physical Security Remote Workers Display Customer Service Printer Cybercrime Paperless Office Infrastructure Monitoring Free Resource Project Management Windows 7 Document Management Microsoft 365 Telephone Money Licensing Humor Employees Integration Entertainment Safety Sports Mouse Telephone System Holidays Robot Administration Cost Management Data Storage Supply Chain Video Conferencing IT Management Managed Services Provider Professional Services VPN Meetings Virtual Machines Customer Relationship Management Settings Printing User Tip Wireless Modem Computer Repair Mobile Security Processor Content Filtering Hacking iPhone Presentation YouTube Cryptocurrency Vulnerabilities Wireless Technology Smart Technology Data Privacy Machine Learning Virtual Desktop Saving Time Images 101 Data storage LiFi Multi-Factor Authentication Mobility Managed IT Service Word Maintenance Outlook Antivirus Downloads Electronic Health Records Social Engineering Break Fix Workforce Public Speaking Browsers Videos Connectivity Upload Remote Computing Wasting Time Threats Lithium-ion battery Security Cameras Workplace Strategies Hacks Entrepreneur Scary Stories Social Network Trend Micro Multi-Factor Security Software as a Service Dark Web Meta Fun Tablet IoT Trends Alert Managing Costs Amazon Deep Learning SSID Undo Managed IT Customer Resource management File Sharing Regulations eCommerce Dark Data Google Calendar Surveillance How To Microsoft Excel Virtual Assistant Outsource IT Education Data Analysis Star Wars Gamification Notifications Staff Virtual Machine Environment Media Medical IT Mobile Computing Reviews Travel Social Networking Legislation Development Transportation Small Businesses Techology Fileless Malware Search Google Maps Content Wearable Technology Hypervisor Displays Application Best Practice PowerPoint Buisness Health IT Shopping Unified Threat Management Motherboard Optimization Comparison Permissions Employer/Employee Relationships Outsourcing IBM Legal IT solutions Unified Threat Management Directions Assessment PCI DSS Navigation Business Growth Workplace Gig Economy Network Congestion Specifications Internet Service Provider Fraud Teamwork Hiring/Firing User Error Microchip Cortana Internet Exlporer Username Regulations Compliance Evernote Paperless Alt Codes Co-managed IT Competition Downtime Point of Sale Memes Black Friday Net Neutrality SQL Server Technology Care Hosted Solution Database Network Management Financial Data Tech Support IT Technicians History Business Communications Typing Scams Proxy Server Smartwatch Cookies IT Monitors Cyber Monday Procurement Hotspot Azure Hybrid Work Google Drive User Knowledge Tactics Telework Websites Mirgation Cyber security Tech Human Resources Cables CES 5G Nanotechnology Communitications Experience Addiction Supply Chain Management Electronic Medical Records Language IP Address Google Docs Unified Communications SharePoint Bitcoin Running Cable Management FinTech Chatbots Term Google Apps Writing Distributed Denial of Service IT Maintenance Google Wallet Lenovo Screen Reader IT Assessment Service Level Agreement Flexibility Virtual Reality Computing Infrastructure Value Business Intelligence Recovery Hard Drives Windows 8 Laptop Server Management Organization Private Cloud Identity Shortcuts Ransmoware Domains Drones Superfish Bookmark Digital Security Cameras Identity Theft Smart Tech Smart Devices Download Remote Working Twitter Alerts Memory Vendors Refrigeration Halloween Error Data Breach Google Play Be Proactive

Blog Archive