Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Saving Money Communication Productivity Cybersecurity Smartphone Managed Service Data Backup Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Automation Information Facebook Artificial Intelligence Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Data Management Government Business Continuity Business Technology Windows 10 Virtualization Wi-Fi Bandwidth Blockchain Vendor Apps Data Security Two-factor Authentication Mobile Office Gmail Apple Tip of the week App Networking Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Chrome Budget Mobile Device Management HIPAA Applications WiFi How To Computing BDR Information Technology Conferencing Hacker Office 365 Avoiding Downtime Marketing Access Control Bring Your Own Device Router Retail Big Data Operating System 2FA Help Desk Managed IT Services Risk Management Computers Analytics Office Tips Healthcare Website Augmented Reality Virtual Private Network Storage Password Health Windows 7 Firewall Microsoft 365 Document Management Solutions The Internet of Things Going Green Social Scam Windows 11 Data loss Monitoring Cybercrime Excel Patch Management Customer Service Save Money Remote Monitoring Vulnerability Telephone End of Support Vendor Management Remote Workers Physical Security Cooperation Display Printer Free Resource Paperless Office Project Management Infrastructure Mouse Images 101 Multi-Factor Authentication Mobility Machine Learning Administration Safety User Tip Modem Mobile Security Employees Maintenance Processor Antivirus Integration Settings Wireless Printing Content Filtering Smart Technology Supply Chain YouTube Holidays Customer Relationship Management Data Storage Saving Time Cryptocurrency Video Conferencing Robot Managed IT Service Managed Services Provider Hacking Professional Services Presentation Virtual Desktop Virtual Machines Data storage LiFi Downloads Wireless Technology Licensing IT Management VPN Outlook Meetings Entertainment Money iPhone Data Privacy Humor Computer Repair Vulnerabilities Word Telephone System Sports Cost Management Websites Content Public Speaking Education Wearable Technology Vendors IT Assessment Flexibility Be Proactive Value Health IT Lithium-ion battery Motherboard Comparison Permissions Entrepreneur Organization SharePoint Workforce Directions Mobile Computing Electronic Medical Records Assessment Search Digital Security Cameras Threats Smart Devices Remote Working Lenovo Workplace Strategies Memory Best Practice Writing Specifications Internet Exlporer Undo Buisness Fraud Meta Data Breach Microchip Google Play Virtual Reality Legal Private Cloud Username IT solutions Videos Amazon Electronic Health Records Server Management Black Friday Superfish Wasting Time Identity Theft Business Growth Database Outsource IT Trend Micro Security Cameras Twitter Media Error IT Technicians Cortana Environment Software as a Service Cyber Monday Managing Costs Proxy Server Alt Codes Social Engineering Cookies Application Remote Computing Tactics Downtime Hotspot Small Businesses eCommerce SSID Virtual Assistant IBM Hosted Solution Mirgation Displays Surveillance Virtual Machine Tablet Typing Nanotechnology Alert Addiction Language Reviews Outsourcing Medical IT Development Managed IT Google Drive Transportation File Sharing Management Dark Data Chatbots Knowledge Distributed Denial of Service Workplace Hypervisor How To Screen Reader PowerPoint Notifications Service Level Agreement Competition Computing Infrastructure 5G Shopping Hiring/Firing Optimization Google Docs Paperless Employer/Employee Relationships Travel Unified Communications Identity Experience PCI DSS Techology Co-managed IT Google Maps Bookmark Bitcoin Navigation Smart Tech Running Cable Download Alerts Gig Economy Technology Care Google Wallet Internet Service Provider Business Communications Teamwork Unified Threat Management User Break Fix Regulations Compliance Unified Threat Management Scams Browsers Windows 8 Evernote Connectivity Laptop Upload Hybrid Work Memes Drones Net Neutrality Human Resources SQL Server Social Network IP Address Network Congestion Multi-Factor Security Dark Web Financial Data User Error Cables History IoT Halloween Trends Smartwatch IT Procurement Google Apps Azure Point of Sale Customer Resource management Regulations Recovery Google Calendar Scary Stories Microsoft Excel Telework IT Maintenance Cyber security Data Analysis Hacks Tech Star Wars Hard Drives Tech Support Gamification Domains Staff Fun CES Business Intelligence Communitications Network Management Supply Chain Management Shortcuts Deep Learning Monitors Social Networking Legislation FinTech Ransmoware Fileless Malware Term Refrigeration

Blog Archive