Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Information Miscellaneous Automation Artificial Intelligence Training Covid-19 Gadgets Compliance Cloud Computing Remote Work Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Bandwidth Windows 10 Wi-Fi Blockchain Two-factor Authentication Vendor Apps Mobile Office Data Security WiFi Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management Gmail BYOD Information Technology HIPAA Access Control Applications Office 365 Hacker Conferencing Avoiding Downtime How To Marketing BDR Computing Risk Management Virtual Private Network Big Data Router Health Analytics Office Tips Augmented Reality 2FA Retail Help Desk Storage Computers Password Bring Your Own Device Managed IT Services Website Healthcare Operating System Physical Security The Internet of Things Display Printer Solutions Paperless Office Social Infrastructure Document Management Windows 11 Monitoring Customer Service Excel Scam Data loss Remote Workers Telephone Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource Firewall End of Support Vulnerability Project Management Windows 7 Vendor Management Cybercrime Microsoft 365 Cryptocurrency Computer Repair Virtual Desktop Employees Data storage LiFi Integration Modem User Tip Processor Outlook Mobile Security Customer Relationship Management Machine Learning Holidays Money Humor Data Storage Hacking Smart Technology Supply Chain Video Conferencing Maintenance Presentation Antivirus Managed Services Provider Sports Virtual Machines Professional Services Saving Time Mouse Wireless Technology Administration Managed IT Service Downloads iPhone Licensing Word Robot Vulnerabilities Entertainment Data Privacy Settings Wireless Printing Images 101 Content Filtering IT Management Multi-Factor Authentication YouTube Meetings Mobility Telephone System VPN Safety Cost Management Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Point of Sale Comparison Google Play Be Proactive 5G Health IT Directions Videos Google Docs Assessment Electronic Health Records Unified Communications Permissions Workforce Experience Bitcoin Network Management Wasting Time Threats Running Cable Tech Support Trend Micro Application Specifications Security Cameras Workplace Strategies Monitors Google Wallet Microchip Internet Exlporer Software as a Service Fraud Meta Username Windows 8 IBM Managing Costs Amazon Laptop Websites eCommerce Black Friday SSID Drones SharePoint Database Surveillance Virtual Assistant Outsource IT Electronic Medical Records Media IT Technicians Virtual Machine Environment Halloween Cookies Cyber Monday Medical IT Writing Proxy Server Reviews Lenovo Tactics Development Competition Hotspot Transportation Small Businesses Virtual Reality Hacks Server Management Mirgation Hypervisor Displays Scary Stories Private Cloud Nanotechnology Optimization Identity Theft PowerPoint Fun Shopping Superfish Addiction Deep Learning Language Employer/Employee Relationships Outsourcing Twitter Navigation Management PCI DSS Chatbots Error User Screen Reader Education Distributed Denial of Service Workplace Social Engineering Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Remote Computing Evernote Paperless Regulations Compliance Mobile Computing IP Address Identity Smart Tech Memes Tablet Co-managed IT Search Bookmark Download Net Neutrality Best Practice Alerts SQL Server Technology Care Alert Recovery Business Communications Dark Data Financial Data Managed IT History Buisness File Sharing Legal Connectivity IT IT solutions Hard Drives Break Fix Scams How To Browsers Smartwatch Upload Procurement Business Growth Domains Azure Hybrid Work Notifications Travel Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Techology IoT Communitications Google Maps Refrigeration Dark Web Cables Cortana CES Trends Supply Chain Management Alt Codes Public Speaking Downtime Unified Threat Management Google Calendar Term Google Apps Customer Resource management FinTech Lithium-ion battery Regulations Data Analysis Unified Threat Management Star Wars IT Assessment Hosted Solution Microsoft Excel IT Maintenance Entrepreneur Gamification Flexibility Typing Staff Value Business Intelligence Social Networking Legislation Shortcuts Network Congestion Organization Fileless Malware Digital Security Cameras Google Drive User Error Smart Devices Undo Ransmoware Knowledge

Blog Archive