Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade Business Management AI Smartphones VoIP Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Network Current Events Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Information Holiday Training Miscellaneous Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Blockchain Bandwidth Virtualization Mobile Office Two-factor Authentication Data Security Vendor Apps App Tip of the week Managed Services Mobile Device Management Voice over Internet Protocol Gmail Chrome Networking Budget Apple Employer-Employee Relationship BYOD Hacker Access Control Computing Avoiding Downtime Conferencing Information Technology Marketing Office 365 How To WiFi BDR HIPAA Applications Virtual Private Network Computers Help Desk Operating System Health Website Risk Management Retail Healthcare Analytics Office Tips Augmented Reality Managed IT Services 2FA Storage Big Data Password Bring Your Own Device Router Physical Security Going Green Customer Service Display Monitoring Printer Paperless Office Cybercrime Infrastructure Document Management Telephone Remote Workers Firewall Cooperation Scam Data loss Windows 11 The Internet of Things Free Resource Project Management Windows 7 Excel Social Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Employees Mobile Security VPN Processor Meetings Integration Hacking Settings Data Privacy Computer Repair Presentation Printing Wireless Smart Technology Holidays Content Filtering Wireless Technology YouTube Saving Time Data Storage Video Conferencing Cryptocurrency Managed Services Provider Machine Learning Managed IT Service Virtual Machines Professional Services Downloads Word Virtual Desktop Licensing Data storage LiFi Maintenance Antivirus Entertainment Outlook iPhone Money Safety Humor Vulnerabilities Telephone System Supply Chain Cost Management Images 101 Sports Robot Mouse Multi-Factor Authentication Mobility Administration IT Management User Tip Modem Customer Relationship Management Network Congestion Legal Trend Micro IT solutions Security Cameras Scams Database Hybrid Work IT Technicians Software as a Service Competition Business Growth User Error Managing Costs Proxy Server Human Resources Cookies Cyber Monday Hotspot eCommerce SSID Cortana Cables Point of Sale Tactics Mirgation Surveillance Alt Codes Virtual Assistant Virtual Machine User Downtime Network Management Google Apps Tech Support Nanotechnology Reviews Monitors Language Hosted Solution Medical IT IT Maintenance Addiction Business Intelligence Management Chatbots Development Typing Transportation Hypervisor Shortcuts Websites Screen Reader IP Address Distributed Denial of Service Shopping Computing Infrastructure Google Drive Optimization PowerPoint Knowledge Ransmoware Service Level Agreement Vendors Electronic Medical Records Identity Employer/Employee Relationships SharePoint Recovery Navigation Bookmark 5G Be Proactive Smart Tech PCI DSS Gig Economy Writing Alerts Google Docs Hard Drives Unified Communications Lenovo Experience Workforce Download Running Cable Threats Virtual Reality Internet Service Provider Domains Bitcoin Teamwork Google Wallet Evernote Server Management Browsers Workplace Strategies Private Cloud Connectivity Regulations Compliance Break Fix Upload Memes Refrigeration Superfish Meta Identity Theft Laptop Amazon Social Network Twitter Net Neutrality Public Speaking Multi-Factor Security Windows 8 SQL Server Dark Web Drones History Error IoT Financial Data Lithium-ion battery Trends Smartwatch Social Engineering IT Entrepreneur Outsource IT Halloween Environment Customer Resource management Media Remote Computing Regulations Procurement Google Calendar Azure Microsoft Excel Cyber security Tech Data Analysis Star Wars Telework Tablet Gamification CES Staff Communitications Undo Small Businesses Scary Stories Displays Alert Social Networking Supply Chain Management Legislation Hacks Dark Data Term Managed IT Fileless Malware Fun File Sharing FinTech Outsourcing Content How To Wearable Technology IT Assessment Deep Learning Health IT Notifications Motherboard Flexibility Comparison Value Organization Permissions Application Education Directions Workplace Travel Assessment Hiring/Firing Google Maps Digital Security Cameras Smart Devices Techology Mobile Computing Memory Paperless Remote Working IBM Specifications Fraud Data Breach Google Play Microchip Search Co-managed IT Unified Threat Management Internet Exlporer Technology Care Username Videos Electronic Health Records Best Practice Unified Threat Management Wasting Time Buisness Business Communications Black Friday

Blog Archive