Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Covid-19 Cloud Computing Gadgets Training Managed Service Provider Remote Work Compliance Server Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Blockchain Mobile Office Vendor Data Security Apps Two-factor Authentication Mobile Device Management Chrome Networking Budget Gmail Apple WiFi BYOD Managed Services App Voice over Internet Protocol Employer-Employee Relationship Tip of the week Office 365 HIPAA Marketing Applications How To BDR Conferencing Access Control Computing Information Technology Hacker Avoiding Downtime Website Analytics Office Tips Router Augmented Reality Managed IT Services Storage Password 2FA Bring Your Own Device Help Desk Big Data Healthcare Virtual Private Network Operating System Health Computers Risk Management Retail Solutions Scam Data loss Firewall Windows 11 Patch Management Monitoring Save Money The Internet of Things Remote Monitoring Excel Vulnerability End of Support Vendor Management Social Physical Security Remote Workers Going Green Display Telephone Printer Paperless Office Cybercrime Infrastructure Customer Service Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Maintenance Antivirus Outlook Employees Word Integration Money Modem Humor User Tip Processor Mobile Security Holidays Sports Mouse Safety Robot Data Storage Smart Technology Supply Chain Video Conferencing Administration Managed Services Provider Virtual Machines Professional Services Saving Time IT Management VPN Meetings Managed IT Service Downloads Settings iPhone Computer Repair Printing Customer Relationship Management Wireless Licensing Content Filtering Vulnerabilities Entertainment YouTube Data Privacy Hacking Cryptocurrency Images 101 Presentation Machine Learning Mobility Telephone System Multi-Factor Authentication Cost Management Wireless Technology Virtual Desktop Data storage LiFi Laptop Assessment Electronic Health Records Permissions Workforce Windows 8 Twitter Directions Videos Drones Error Recovery Wasting Time Threats Specifications Security Cameras Workplace Strategies Social Engineering Hard Drives Trend Micro Microchip Domains Halloween Internet Exlporer Software as a Service Fraud Meta Remote Computing Username Managing Costs Amazon eCommerce Black Friday SSID Tablet Refrigeration Hacks Alert Public Speaking Scary Stories Database Surveillance Virtual Assistant Outsource IT Media Managed IT File Sharing Lithium-ion battery Dark Data Fun IT Technicians Virtual Machine Environment Cookies Entrepreneur Cyber Monday Medical IT Deep Learning How To Proxy Server Reviews Notifications Tactics Development Hotspot Transportation Small Businesses Travel Education Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Techology Google Maps Shopping Undo Mobile Computing Addiction Language Employer/Employee Relationships Outsourcing Navigation Unified Threat Management Management PCI DSS Search Chatbots Screen Reader Distributed Denial of Service Workplace Unified Threat Management Best Practice Gig Economy Buisness Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Legal IT solutions Network Congestion Regulations Compliance Application Identity Smart Tech Memes Co-managed IT User Error Business Growth Bookmark IBM Download Net Neutrality Alerts SQL Server Technology Care Business Communications Point of Sale Financial Data Cortana History Connectivity IT Break Fix Scams Alt Codes Browsers Smartwatch Tech Support Downtime Upload Procurement Azure Hybrid Work Network Management Multi-Factor Security Tech Human Resources Hosted Solution Monitors Social Network Telework Cyber security IoT Communitications Dark Web Cables Typing CES Competition Websites Trends Supply Chain Management Google Calendar Term Google Apps Google Drive Customer Resource management FinTech Knowledge Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance SharePoint Electronic Medical Records Data Analysis Gamification Flexibility User 5G Staff Value Business Intelligence Legislation Shortcuts Lenovo Google Docs Unified Communications Writing Organization Experience Social Networking Running Cable Smart Devices Ransmoware Bitcoin Virtual Reality Fileless Malware Digital Security Cameras Google Wallet Private Cloud IP Address Content Remote Working Wearable Technology Memory Vendors Server Management Comparison Google Play Be Proactive Superfish Identity Theft Health IT Motherboard Data Breach

Blog Archive