Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery Smartphones VoIP Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Gadgets Training Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship Tip of the week Chrome Managed Services Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App WiFi BYOD Computing Applications Information Technology Access Control Hacker Office 365 Avoiding Downtime Conferencing Marketing How To BDR HIPAA Router 2FA Virtual Private Network Risk Management Health Computers Help Desk Office Tips Analytics Augmented Reality Website Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Windows 11 Physical Security Display Printer Excel Customer Service Paperless Office Infrastructure Monitoring Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 The Internet of Things Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Social Vendor Management Solutions Cybercrime VPN Employees YouTube Meetings Integration Cryptocurrency Customer Relationship Management Supply Chain User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage Hacking LiFi Presentation Data Storage Smart Technology Outlook Video Conferencing Wireless Technology Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Maintenance Data Privacy Antivirus Word Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Administration Safety Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Content Filtering IT Management IBM Trend Micro Network Congestion Specifications Security Cameras Knowledge Fraud Small Businesses Google Drive User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Displays Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsourcing Google Docs Unified Communications Database Surveillance Competition Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Workplace Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Hiring/Firing Tactics Development Paperless Windows 8 Laptop Websites Mirgation Hypervisor Co-managed IT Drones Shopping User Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Technology Care SharePoint Addiction Business Communications Management PCI DSS Halloween Chatbots Navigation IP Address Scams Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Hybrid Work Service Level Agreement Internet Service Provider Human Resources Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Cables Superfish Bookmark Recovery Identity Theft Smart Tech Memes Fun Deep Learning Download Net Neutrality Twitter Alerts SQL Server Hard Drives Domains Google Apps Financial Data Error History Social Engineering Break Fix IT Maintenance Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Business Intelligence Refrigeration Public Speaking Shortcuts Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Search Dark Web Lithium-ion battery Ransmoware CES Tablet IoT Communitications Best Practice Trends Supply Chain Management Entrepreneur Alert Vendors Be Proactive Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term How To Microsoft Excel Workforce Legal Data Analysis IT solutions Star Wars IT Assessment Undo Business Growth Gamification Flexibility Notifications Staff Value Threats Workplace Strategies Organization Travel Social Networking Legislation Cortana Meta Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Amazon Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Permissions Outsource IT Unified Threat Management Directions Videos Application Hosted Solution Assessment Electronic Health Records Media Typing Wasting Time Environment

Blog Archive