Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Data Recovery Disaster Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Cloud Computing Gadgets Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security WiFi App BYOD Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Mobile Device Management Voice over Internet Protocol Networking Gmail Apple HIPAA Computing Applications Information Technology Access Control Hacker Office 365 Avoiding Downtime Marketing Conferencing How To BDR Big Data Operating System Router Virtual Private Network Risk Management Health Computers Help Desk Analytics Office Tips Augmented Reality Website Retail 2FA Storage Password Managed IT Services Bring Your Own Device Healthcare Free Resource The Internet of Things Patch Management Save Money Project Management Windows 7 Remote Monitoring Going Green End of Support Vulnerability Social Vendor Management Microsoft 365 Physical Security Cybercrime Solutions Display Printer Customer Service Paperless Office Infrastructure Monitoring Document Management Windows 11 Scam Telephone Data loss Remote Workers Excel Firewall Cooperation Robot Telephone System Images 101 Cost Management Mobility Data Privacy Settings Multi-Factor Authentication Wireless IT Management Printing Content Filtering VPN Meetings YouTube Customer Relationship Management Computer Repair Cryptocurrency Employees Integration User Tip Modem Mobile Security Processor Hacking Presentation Virtual Desktop Data storage LiFi Holidays Wireless Technology Machine Learning Smart Technology Outlook Data Storage Video Conferencing Saving Time Money Humor Managed Services Provider Professional Services Maintenance Virtual Machines Antivirus Word Managed IT Service Supply Chain Downloads Sports Mouse Licensing iPhone Administration Entertainment Safety Vulnerabilities Scams IT solutions Supply Chain Management Data Analysis Star Wars Travel Legal Microsoft Excel Gamification Google Maps Staff Hybrid Work Business Growth FinTech Techology Term IT Assessment Social Networking Legislation Human Resources Cables Flexibility Cortana Value Fileless Malware Unified Threat Management Content Application Wearable Technology Alt Codes Organization Unified Threat Management Smart Devices Health IT Motherboard Comparison Digital Security Cameras Google Apps Downtime Permissions IT Maintenance Network Congestion Hosted Solution Remote Working Memory Directions IBM Assessment Google Play Business Intelligence Typing Data Breach User Error Electronic Health Records Specifications Videos Shortcuts Fraud Ransmoware Knowledge Wasting Time Microchip Internet Exlporer Point of Sale Google Drive Security Cameras Username Vendors Trend Micro Software as a Service 5G Competition Network Management Tech Support Black Friday Be Proactive Workforce Monitors Unified Communications Experience Managing Costs Database Google Docs SSID IT Technicians Threats Bitcoin Running Cable eCommerce Surveillance Virtual Assistant Proxy Server Cookies Websites Google Wallet Cyber Monday Workplace Strategies Hotspot Meta Virtual Machine Tactics User Medical IT Mirgation Amazon Electronic Medical Records Windows 8 Reviews Laptop SharePoint Development Transportation Nanotechnology Drones Language Outsource IT Writing Hypervisor IP Address Lenovo Addiction PowerPoint Management Chatbots Environment Virtual Reality Shopping Media Halloween Optimization Employer/Employee Relationships Server Management Screen Reader Private Cloud Distributed Denial of Service Identity Theft Computing Infrastructure Small Businesses PCI DSS Superfish Navigation Service Level Agreement Recovery Hard Drives Identity Displays Twitter Hacks Gig Economy Scary Stories Internet Service Provider Fun Teamwork Bookmark Domains Smart Tech Error Alerts Outsourcing Social Engineering Deep Learning Regulations Compliance Evernote Download Refrigeration Remote Computing Memes Workplace Education Net Neutrality SQL Server Browsers Public Speaking Connectivity Break Fix Tablet Hiring/Firing Financial Data History Lithium-ion battery Upload Social Network Entrepreneur Alert Mobile Computing Multi-Factor Security Smartwatch Paperless IT Co-managed IT Dark Data Procurement Search Azure Managed IT IoT File Sharing Dark Web Technology Care How To Best Practice Telework Cyber security Tech Trends Customer Resource management Undo Regulations Notifications Google Calendar CES Business Communications Buisness Communitications

Blog Archive