Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Computer Google Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Disaster Recovery Upgrade Data Recovery AI Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Automation Facebook Miscellaneous Information Artificial Intelligence Gadgets Training Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Wi-Fi Windows 10 Blockchain Virtualization Vendor Apps Mobile Office Two-factor Authentication Data Security Budget Employer-Employee Relationship Apple Tip of the week App Managed Services Voice over Internet Protocol Mobile Device Management Networking Gmail WiFi Chrome BYOD Applications Access Control Hacker Avoiding Downtime Conferencing Marketing Computing Information Technology How To BDR Office 365 HIPAA Router Storage Virtual Private Network Password Bring Your Own Device Health 2FA Computers Help Desk Website Retail Operating System Healthcare Risk Management Managed IT Services Analytics Office Tips Big Data Augmented Reality Physical Security Display Printer Paperless Office Windows 11 Customer Service Infrastructure Monitoring Excel Document Management Going Green Remote Workers Telephone Cybercrime Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Patch Management The Internet of Things Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Social Meetings VPN Employees Integration Modem Sports User Tip Customer Relationship Management Processor Mouse Computer Repair Mobile Security Holidays Administration Hacking Data Storage Presentation Smart Technology Supply Chain Video Conferencing Wireless Technology Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Settings Managed IT Service Wireless Printing Maintenance Content Filtering Word Downloads Antivirus YouTube iPhone Licensing Cryptocurrency Vulnerabilities Entertainment Data Privacy Safety Virtual Desktop Images 101 Data storage LiFi Robot Mobility Telephone System Multi-Factor Authentication Cost Management Outlook Money Humor IT Management Trend Micro Scary Stories Network Congestion Specifications Security Cameras Workplace Strategies Hacks IBM User Error Microchip Internet Exlporer Software as a Service Fraud Meta Fun Username Deep Learning Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Database Surveillance Education Virtual Assistant Outsource IT Media Network Management Competition Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Proxy Server Reviews Mobile Computing Tactics Development Hotspot Transportation Small Businesses Search Best Practice Websites Mirgation Hypervisor Displays Nanotechnology Optimization Buisness User PowerPoint Shopping SharePoint Legal Addiction IT solutions Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Business Growth Chatbots IP Address Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Cortana Evernote Paperless Server Management Regulations Compliance Alt Codes Private Cloud Identity Identity Theft Smart Tech Memes Downtime Recovery Co-managed IT Superfish Bookmark Download Net Neutrality Hosted Solution Hard Drives Twitter Alerts SQL Server Technology Care Business Communications Financial Data Typing Domains Error History Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Google Drive Upload Procurement Refrigeration Remote Computing Azure Hybrid Work Knowledge Multi-Factor Security Tech Human Resources Social Network Telework Public Speaking Cyber security Lithium-ion battery Tablet IoT Communitications Dark Web Cables 5G CES Google Docs Trends Supply Chain Management Unified Communications Alert Experience Entrepreneur Running Cable Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Bitcoin File Sharing Regulations Google Wallet Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Undo Notifications Staff Value Business Intelligence Laptop Legislation Shortcuts Organization Windows 8 Travel Social Networking Drones Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Halloween Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach Unified Threat Management Directions Videos Assessment Electronic Health Records Application Permissions Workforce Wasting Time Threats

Blog Archive