Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Artificial Intelligence Automation Facebook Miscellaneous Information Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Virtualization Wi-Fi Blockchain Vendor Mobile Office Data Security Apps Two-factor Authentication Chrome Budget Mobile Device Management Tip of the week Apple Gmail Managed Services Voice over Internet Protocol App WiFi Networking Employer-Employee Relationship BYOD Avoiding Downtime Applications Marketing Access Control Conferencing How To Computing BDR Information Technology Office 365 Hacker HIPAA Router Analytics Office Tips Physical Security Augmented Reality Virtual Private Network Website Storage Password Health Help Desk Bring Your Own Device Retail Healthcare Big Data Operating System Managed IT Services 2FA Risk Management Computers Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management Remote Workers The Internet of Things Going Green Telephone Scam Data loss Social Cybercrime Windows 11 Cooperation Free Resource Project Management Windows 7 Patch Management Excel Save Money Microsoft 365 Remote Monitoring Customer Service End of Support Vulnerability Vendor Management Solutions Outlook Meetings VPN Employees Wireless Technology Integration Money User Tip Humor Modem Processor Computer Repair Mobile Security Holidays Data Privacy Word Sports Data Storage Mouse Smart Technology Video Conferencing Machine Learning Managed Services Provider Administration Saving Time Virtual Machines Professional Services Safety Managed IT Service Maintenance Downloads Antivirus iPhone Settings Wireless Printing Licensing Content Filtering Entertainment Vulnerabilities YouTube Images 101 Cryptocurrency Supply Chain Customer Relationship Management Multi-Factor Authentication Robot Mobility Telephone System Cost Management Virtual Desktop Data storage Hacking LiFi Presentation IT Management Trend Micro Network Congestion Specifications Security Cameras Technology Care Business Communications User Error Microchip Internet Exlporer Software as a Service Fraud Halloween Scams Username IP Address Managing Costs Point of Sale eCommerce Black Friday SSID Hybrid Work Human Resources Database Surveillance Hacks Virtual Assistant Scary Stories Tech Support IT Technicians Virtual Machine Recovery Fun Cables Network Management Proxy Server Reviews Cookies Hard Drives Deep Learning Monitors Cyber Monday Medical IT Google Apps Tactics Development Domains Hotspot Transportation Websites Mirgation Hypervisor Education IT Maintenance Shopping Nanotechnology Optimization Refrigeration PowerPoint Business Intelligence Shortcuts SharePoint Addiction Public Speaking Mobile Computing Electronic Medical Records Language Employer/Employee Relationships Chatbots Navigation Search Ransmoware Management PCI DSS Lithium-ion battery Lenovo Gig Economy Screen Reader Best Practice Writing Distributed Denial of Service Entrepreneur Vendors Be Proactive Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Buisness Legal Private Cloud Identity IT solutions Evernote Workforce Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Undo Business Growth Threats Workplace Strategies Download Net Neutrality Twitter Alerts SQL Server Error History Cortana Meta Financial Data Browsers Smartwatch Connectivity IT Alt Codes Social Engineering Break Fix Amazon Downtime Upload Procurement Remote Computing Azure Cyber security Application Hosted Solution Multi-Factor Security Tech Outsource IT Social Network Telework Media CES Tablet IoT Communitications Typing Dark Web Environment Trends Supply Chain Management IBM Alert Google Drive File Sharing Regulations Dark Data Google Calendar Term Knowledge Small Businesses Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel Displays 5G Gamification Flexibility Notifications Staff Value Google Docs Travel Social Networking Unified Communications Legislation Experience Outsourcing Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Competition Bitcoin Running Cable Workplace Content Remote Working Google Wallet Wearable Technology Memory Unified Threat Management Motherboard Data Breach Comparison Google Play Hiring/Firing Health IT Paperless Unified Threat Management Directions Videos Assessment Electronic Health Records Windows 8 Permissions Laptop User Co-managed IT Drones Wasting Time

Blog Archive