Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Email Workplace Tips Computer Phishing Google Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money AI Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Facebook Holiday Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Compliance Remote Work Outsourced IT Server Managed Service Provider IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Government Data Management Business Continuity Windows 10 Virtualization Wi-Fi Business Technology Blockchain Bandwidth Data Security Apps Two-factor Authentication Managed Services Vendor Mobile Office Mobile Device Management Apple Gmail App BYOD WiFi Employer-Employee Relationship Tip of the week Voice over Internet Protocol Chrome Budget Networking BDR Physical Security Conferencing Computing Information Technology Access Control Office 365 Hacker Avoiding Downtime HIPAA Marketing Managed IT Services Password Applications How To Help Desk Operating System Virtual Private Network Big Data Risk Management Health Computers Analytics Office Tips Retail Augmented Reality Healthcare 2FA Website Storage Router Bring Your Own Device Windows 7 Patch Management Firewall Save Money Microsoft 365 Monitoring Remote Monitoring Vulnerability End of Support Going Green Vendor Management Solutions The Internet of Things Cybercrime Display Managed IT Service Social Printer Telephone Paperless Office Infrastructure Cooperation Document Management Customer Service Remote Workers Windows 11 Scam Data loss Excel Free Resource Project Management Mobile Security Images 101 Processor Administration Multi-Factor Authentication Robot Mobility Smart Technology Safety IT Management Settings VPN Employees Meetings Saving Time Data Privacy Printing Wireless Integration Content Filtering YouTube Computer Repair Downloads Holidays Cryptocurrency Licensing Data Storage Entertainment Customer Relationship Management Virtual Desktop Video Conferencing Machine Learning Managed Services Provider Data storage LiFi Virtual Machines Professional Services Hacking Telephone System Presentation Outlook Cost Management Money Maintenance Wireless Technology Humor Antivirus iPhone Supply Chain Sports Vulnerabilities Mouse User Tip Modem Word Paperless IT Assessment How To Database Mobile Computing Value Refrigeration IT Technicians Co-managed IT Search Flexibility Notifications Organization Travel Proxy Server Public Speaking Cookies Technology Care Best Practice Cyber Monday Hotspot Business Communications Buisness Techology Digital Security Cameras Google Maps Smart Devices Lithium-ion battery Tactics Memory Legal Mirgation Scams Entrepreneur IT solutions Remote Working Unified Threat Management Data Breach Nanotechnology Google Play Hybrid Work Business Growth Language Human Resources Unified Threat Management Videos Electronic Health Records Addiction Management Wasting Time Undo Chatbots Cables Cortana Trend Micro Network Congestion Screen Reader Security Cameras Alt Codes Distributed Denial of Service Computing Infrastructure Google Apps Downtime User Error Software as a Service Service Level Agreement Managing Costs Identity IT Maintenance Hosted Solution Point of Sale Bookmark eCommerce Smart Tech SSID Business Intelligence Typing Application Alerts Shortcuts Surveillance Download Virtual Assistant Tech Support Virtual Machine Google Drive Ransmoware Knowledge Network Management Reviews Browsers IBM Monitors Connectivity Medical IT Vendors Break Fix Transportation Be Proactive 5G Development Upload Websites Social Network Hypervisor Google Docs Workforce Unified Communications Multi-Factor Security Experience Running Cable Shopping Optimization IoT PowerPoint Threats Bitcoin Dark Web Employer/Employee Relationships Google Wallet Workplace Strategies SharePoint Electronic Medical Records Trends PCI DSS Customer Resource management Competition Regulations Navigation Meta Google Calendar Laptop Lenovo Gig Economy Data Analysis Writing Star Wars Amazon Windows 8 Microsoft Excel Gamification Teamwork Drones Staff Internet Service Provider Virtual Reality Regulations Compliance Private Cloud Social Networking Evernote Outsource IT Legislation Server Management Media Halloween Superfish Identity Theft Fileless Malware Memes Environment User Content SQL Server Wearable Technology Net Neutrality Twitter Financial Data Error Health IT History Motherboard Small Businesses Comparison Permissions Scary Stories Smartwatch Directions IT IP Address Social Engineering Assessment Displays Hacks Azure Fun Procurement Remote Computing Telework Cyber security Tech Outsourcing Deep Learning Specifications Fraud CES Tablet Microchip Communitications Internet Exlporer Recovery Username Hard Drives Workplace Education Supply Chain Management Alert FinTech File Sharing Domains Dark Data Term Hiring/Firing Black Friday Managed IT

Blog Archive