Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Information Facebook Holiday Miscellaneous Covid-19 Cloud Computing Training Gadgets Server Compliance Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Windows 10 Blockchain Wi-Fi Virtualization Apps Mobile Office Data Security Vendor Two-factor Authentication Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking Mobile Device Management App Gmail BYOD WiFi Managed Services Voice over Internet Protocol Office 365 Conferencing Hacker Avoiding Downtime Marketing How To BDR HIPAA Computing Applications Information Technology Access Control Healthcare Help Desk Office Tips Analytics Augmented Reality Computers Retail Storage Password Bring Your Own Device Website Managed IT Services Operating System Router 2FA Physical Security Virtual Private Network Risk Management Big Data Health Monitoring Document Management Customer Service Free Resource Project Management Windows 7 Telephone Scam Microsoft 365 Data loss Cooperation Solutions Going Green Patch Management Firewall Save Money Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Cybercrime The Internet of Things Excel Display Social Printer Paperless Office Infrastructure Remote Workers Customer Relationship Management Smart Technology iPhone Outlook Machine Learning Money Saving Time Hacking Vulnerabilities Humor Presentation Data Privacy Managed IT Service Maintenance Images 101 Antivirus Sports Wireless Technology Downloads Mobility Mouse Multi-Factor Authentication Licensing Entertainment Administration Word Employees Integration Telephone System Robot Cost Management Settings Printing Wireless Safety Content Filtering Holidays IT Management VPN YouTube Meetings Data Storage Supply Chain Cryptocurrency Video Conferencing User Tip Modem Managed Services Provider Computer Repair Mobile Security Virtual Machines Professional Services Processor Virtual Desktop Data storage LiFi Windows 8 Laptop Websites Mirgation Net Neutrality SQL Server Technology Care Business Communications Drones Nanotechnology Financial Data History Electronic Medical Records Language IT Scams SharePoint Addiction Smartwatch Management Halloween Chatbots Procurement Competition Azure Hybrid Work Tech Human Resources Lenovo Screen Reader Telework Writing Distributed Denial of Service Cyber security Virtual Reality Computing Infrastructure Communitications Cables Service Level Agreement CES Hacks Server Management Scary Stories Private Cloud Identity Supply Chain Management User Term Google Apps Superfish Bookmark Identity Theft Smart Tech FinTech Fun Twitter Alerts IT Assessment IT Maintenance Deep Learning Download Error Flexibility Value Business Intelligence Shortcuts Browsers Education Connectivity Organization IP Address Social Engineering Break Fix Remote Computing Smart Devices Ransmoware Upload Digital Security Cameras Mobile Computing Social Network Remote Working Multi-Factor Security Memory Vendors Recovery Google Play Be Proactive Tablet IoT Search Dark Web Data Breach Alert Electronic Health Records Hard Drives Workforce Best Practice Trends Videos Managed IT Customer Resource management Buisness File Sharing Regulations Domains Dark Data Google Calendar Wasting Time Threats Security Cameras Workplace Strategies Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Trend Micro Notifications Staff Software as a Service Refrigeration Meta Business Growth Gamification Travel Social Networking Public Speaking Legislation Managing Costs Amazon SSID Techology Fileless Malware Google Maps Lithium-ion battery Cortana eCommerce Wearable Technology Surveillance Virtual Assistant Outsource IT Entrepreneur Alt Codes Content Health IT Downtime Unified Threat Management Motherboard Comparison Virtual Machine Environment Media Medical IT Unified Threat Management Directions Hosted Solution Assessment Reviews Permissions Development Undo Transportation Small Businesses Typing Network Congestion Specifications Hypervisor Displays Optimization PowerPoint Google Drive User Error Microchip Internet Exlporer Shopping Knowledge Fraud Username Employer/Employee Relationships Outsourcing Navigation Point of Sale PCI DSS 5G Black Friday Experience Application Workplace Google Docs Unified Communications Database Gig Economy Bitcoin Network Management Running Cable Tech Support IT Technicians Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Google Wallet Proxy Server Cookies Regulations Compliance IBM Monitors Cyber Monday Hotspot Memes Co-managed IT Tactics

Blog Archive