Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Google Email Workplace Tips Privacy Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service AI Mobile Device Productivity Microsoft Saving Money Passwords Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Automation Artificial Intelligence Holiday Training Gadgets Compliance Cloud Computing Covid-19 Outsourced IT Server Managed Service Provider IT Support Remote Work Employee/Employer Relationship Encryption Spam Windows 10 Office Government Data Management Business Continuity Virtualization Business Technology Wi-Fi Blockchain Windows 10 Vendor Bandwidth Apps Managed Services Two-factor Authentication Data Security Mobile Office WiFi Apple App Tip of the week Employer-Employee Relationship Voice over Internet Protocol Networking Mobile Device Management Chrome BYOD Gmail Budget Access Control Conferencing Computing Hacker Managed IT Services Information Technology How To Avoiding Downtime BDR Marketing Office 365 HIPAA Physical Security Applications Password Bring Your Own Device Big Data Health Help Desk Retail Operating System Healthcare Computers Risk Management 2FA Website Analytics Office Tips Augmented Reality Router Storage Virtual Private Network Printer The Internet of Things Paperless Office Infrastructure Social Monitoring Document Management Going Green Managed IT Service Remote Workers Customer Service Cybercrime Telephone Scam Data loss Windows 11 Cooperation Free Resource Project Management Windows 7 Excel Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Display Processor Data Privacy Computer Repair Mobile Security Mouse Holidays Administration Data Storage Smart Technology Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Customer Relationship Management Settings Printing Wireless Content Filtering Maintenance Hacking Downloads Antivirus Presentation iPhone YouTube Licensing Cryptocurrency Entertainment Wireless Technology Vulnerabilities Supply Chain Images 101 Virtual Desktop LiFi Data storage Multi-Factor Authentication Robot Mobility Telephone System Cost Management Word Outlook Money IT Management Humor Meetings VPN Employees Integration Safety Modem Sports User Tip Database Surveillance Virtual Assistant Education Network Management Tech Support IT Technicians Virtual Machine Google Apps Cookies IT Maintenance Monitors Cyber Monday Medical IT Mobile Computing Proxy Server Reviews Search Tactics Development Business Intelligence Hotspot Transportation Application Best Practice Websites Mirgation Hypervisor Shortcuts Nanotechnology Optimization Ransmoware PowerPoint Buisness Shopping SharePoint Addiction Vendors IBM Electronic Medical Records Language Employer/Employee Relationships Legal IT solutions Be Proactive Navigation Business Growth Management PCI DSS Chatbots Screen Reader Workforce Writing Distributed Denial of Service Lenovo Gig Economy Cortana Service Level Agreement Internet Service Provider Threats Virtual Reality Computing Infrastructure Teamwork Workplace Strategies Evernote Alt Codes Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Meta Competition Downtime Superfish Bookmark Download Net Neutrality Amazon Twitter Alerts SQL Server Hosted Solution Typing Financial Data Error History Connectivity IT Outsource IT Social Engineering Break Fix Browsers Smartwatch Knowledge Upload Procurement Environment Remote Computing Azure Google Drive Media User Multi-Factor Security Tech Social Network Telework Cyber security CES Tablet IoT Communitications Small Businesses Dark Web 5G Unified Communications Experience Trends Supply Chain Management Displays IP Address Alert Google Docs File Sharing Regulations Dark Data Google Calendar Term Bitcoin Running Cable Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment Outsourcing How To Microsoft Excel Google Wallet Recovery Gamification Flexibility Notifications Staff Value Travel Social Networking Workplace Hard Drives Legislation Windows 8 Laptop Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Hiring/Firing Domains Drones Content Remote Working Wearable Technology Memory Paperless Unified Threat Management Motherboard Data Breach Co-managed IT Refrigeration Comparison Google Play Halloween Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Technology Care Public Speaking Permissions Lithium-ion battery Wasting Time Business Communications Trend Micro Scams Network Congestion Specifications Security Cameras Hacks Entrepreneur Scary Stories Fun User Error Microchip Internet Exlporer Software as a Service Hybrid Work Fraud Deep Learning Username Managing Costs Human Resources Point of Sale eCommerce Cables Undo Black Friday SSID

Blog Archive