Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Holiday Miscellaneous Cloud Computing Covid-19 Gadgets Training Server Compliance Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Tip of the week Chrome Managed Services Budget Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail WiFi BYOD Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To BDR HIPAA Computing Applications Information Technology Health 2FA Help Desk Analytics Office Tips Computers Augmented Reality Retail Storage Healthcare Password Website Bring Your Own Device Managed IT Services Operating System Router Big Data Virtual Private Network Risk Management Paperless Office Windows 11 Infrastructure Monitoring Customer Service Excel Document Management Remote Workers Telephone Scam Data loss Free Resource Cooperation Project Management Firewall Windows 7 Going Green Patch Management Microsoft 365 Save Money Remote Monitoring End of Support Vulnerability The Internet of Things Solutions Vendor Management Cybercrime Physical Security Social Display Printer Holidays Virtual Desktop Data storage Customer Relationship Management LiFi Data Storage Supply Chain Smart Technology Outlook Video Conferencing Hacking Managed Services Provider Machine Learning Saving Time Money Presentation Virtual Machines Professional Services Humor Wireless Technology Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Entertainment Administration Word Vulnerabilities Data Privacy Images 101 Multi-Factor Authentication Mobility Robot Telephone System Cost Management Safety Settings Wireless Printing Content Filtering IT Management Employees VPN YouTube Meetings Integration Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Proxy Server Reviews Google Wallet Cookies Medical IT Monitors Cyber Monday Development Tactics Small Businesses Transportation Hotspot Hypervisor Laptop Websites Mirgation Windows 8 Displays Shopping Drones Competition Optimization Nanotechnology PowerPoint SharePoint Addiction Outsourcing Employer/Employee Relationships Electronic Medical Records Language Halloween Chatbots Navigation PCI DSS Management Gig Economy Lenovo Screen Reader Workplace Writing Distributed Denial of Service Internet Service Provider Service Level Agreement Hiring/Firing User Teamwork Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Paperless Evernote Regulations Compliance Hacks Server Management Bookmark Superfish Memes Identity Theft Smart Tech Co-managed IT Fun IP Address Net Neutrality Deep Learning Download Technology Care SQL Server Twitter Alerts History Error Business Communications Financial Data Browsers Smartwatch IT Education Connectivity Scams Social Engineering Break Fix Procurement Upload Hybrid Work Recovery Azure Remote Computing Hard Drives Cyber security Human Resources Tech Multi-Factor Security Telework Mobile Computing Social Network CES Domains Communitications Tablet IoT Cables Search Dark Web Supply Chain Management Best Practice Trends Alert Refrigeration Buisness File Sharing Regulations Google Apps Term Dark Data Google Calendar FinTech Managed IT Customer Resource management Data Analysis Legal Public Speaking IT Assessment IT solutions Star Wars IT Maintenance How To Microsoft Excel Lithium-ion battery Flexibility Business Growth Gamification Business Intelligence Value Notifications Staff Travel Social Networking Shortcuts Entrepreneur Legislation Organization Fileless Malware Digital Security Cameras Techology Smart Devices Google Maps Ransmoware Cortana Remote Working Alt Codes Content Vendors Memory Wearable Technology Undo Data Breach Downtime Unified Threat Management Motherboard Be Proactive Google Play Comparison Health IT Directions Videos Unified Threat Management Electronic Health Records Hosted Solution Assessment Workforce Permissions Typing Threats Wasting Time Trend Micro Workplace Strategies Security Cameras Network Congestion Specifications Microchip Google Drive User Error Software as a Service Internet Exlporer Meta Knowledge Fraud Application Managing Costs Username Amazon eCommerce Point of Sale SSID 5G Black Friday Google Docs IBM Surveillance Unified Communications Database Outsource IT Virtual Assistant Experience Virtual Machine Running Cable Tech Support IT Technicians Media Bitcoin Network Management Environment

Blog Archive