Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android Upgrade AI Business Management VoIP Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Automation Information Artificial Intelligence Facebook Covid-19 Cloud Computing Holiday Miscellaneous Gadgets Training Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Blockchain Wi-Fi Windows 10 Bandwidth Virtualization Vendor Two-factor Authentication Mobile Office Data Security Apps Tip of the week Networking Mobile Device Management Chrome Gmail Managed Services Voice over Internet Protocol Budget BYOD Apple App Employer-Employee Relationship Computing Hacker Information Technology HIPAA Avoiding Downtime Applications Marketing Office 365 How To BDR Conferencing WiFi Access Control Operating System Computers Risk Management Retail 2FA Router Website Managed IT Services Analytics Office Tips Augmented Reality Help Desk Storage Healthcare Password Bring Your Own Device Big Data Virtual Private Network Health Customer Service Solutions Cybercrime Document Management Windows 11 Scam Data loss Excel Firewall Monitoring Patch Management Remote Workers Save Money Remote Monitoring Vulnerability End of Support Vendor Management The Internet of Things Physical Security Telephone Free Resource Social Project Management Display Windows 7 Printer Going Green Cooperation Paperless Office Microsoft 365 Infrastructure Settings Printing Wireless Content Filtering Telephone System Cost Management Machine Learning Hacking YouTube Employees Presentation Integration Cryptocurrency Wireless Technology Maintenance Antivirus Supply Chain Holidays Virtual Desktop LiFi User Tip Data storage Modem Mobile Security Data Storage Processor Word Video Conferencing Outlook Managed Services Provider Virtual Machines Professional Services Money Smart Technology Humor Robot Safety Saving Time Sports Data Privacy iPhone Mouse IT Management Managed IT Service VPN Meetings Downloads Vulnerabilities Administration Licensing Images 101 Computer Repair Entertainment Multi-Factor Authentication Mobility Customer Relationship Management Star Wars Alt Codes Microsoft Excel Websites Remote Working Workplace Strategies Memory Data Analysis Data Breach Google Play Gamification Staff Downtime Meta Competition Legislation Videos Amazon Electronic Medical Records Electronic Health Records SharePoint Social Networking Hosted Solution Typing Wasting Time Fileless Malware Trend Micro Security Cameras Content Lenovo Wearable Technology Outsource IT Writing Comparison Environment Knowledge Virtual Reality Software as a Service Media User Health IT Google Drive Motherboard Assessment Server Management Permissions Private Cloud Managing Costs Directions eCommerce SSID Superfish Identity Theft Small Businesses 5G Specifications Displays Experience Twitter IP Address Surveillance Virtual Assistant Google Docs Unified Communications Internet Exlporer Bitcoin Fraud Running Cable Error Virtual Machine Microchip Social Engineering Medical IT Username Google Wallet Reviews Outsourcing Black Friday Remote Computing Development Recovery Transportation Database Windows 8 Laptop Workplace Hard Drives Hypervisor Domains Optimization PowerPoint Drones IT Technicians Tablet Shopping Hiring/Firing Cyber Monday Alert Paperless Employer/Employee Relationships Proxy Server Cookies Navigation Tactics Managed IT Hotspot Halloween File Sharing PCI DSS Co-managed IT Dark Data Refrigeration Technology Care How To Public Speaking Mirgation Gig Economy Notifications Lithium-ion battery Internet Service Provider Business Communications Teamwork Nanotechnology Entrepreneur Evernote Addiction Hacks Language Scary Stories Travel Regulations Compliance Scams Hybrid Work Fun Memes Management Techology Chatbots Google Maps Screen Reader Deep Learning Distributed Denial of Service Net Neutrality Human Resources SQL Server History Service Level Agreement Computing Infrastructure Unified Threat Management Financial Data Cables Undo Smartwatch IT Unified Threat Management Identity Education Smart Tech Procurement Google Apps Azure Bookmark Cyber security Tech Download Mobile Computing Alerts Telework IT Maintenance Network Congestion CES Business Intelligence Search Communitications User Error Connectivity Best Practice Break Fix Supply Chain Management Shortcuts Application Browsers Term Upload Buisness Point of Sale FinTech Ransmoware Multi-Factor Security Vendors IBM IT Assessment Social Network Legal IT solutions IoT Business Growth Network Management Dark Web Tech Support Flexibility Be Proactive Value Trends Organization Workforce Monitors Google Calendar Digital Security Cameras Threats Cortana Smart Devices Customer Resource management Regulations

Blog Archive