Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Artificial Intelligence Information Automation Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Data Security Two-factor Authentication Mobile Office Vendor Apps BYOD Chrome Mobile Device Management Budget Gmail Tip of the week Apple WiFi App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking How To Computing BDR Information Technology Hacker Avoiding Downtime Office 365 Marketing HIPAA Applications Access Control Conferencing Risk Management Computers Analytics Website Office Tips Augmented Reality Virtual Private Network Router Storage Health Password Bring Your Own Device 2FA Help Desk Big Data Retail Operating System Healthcare Managed IT Services Customer Service Patch Management Cooperation Free Resource Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Microsoft 365 Physical Security Solutions Display Printer Firewall Paperless Office Infrastructure Windows 11 Monitoring The Internet of Things Document Management Excel Social Going Green Scam Remote Workers Data loss Telephone Cybercrime iPhone YouTube Licensing Cryptocurrency Vulnerabilities Entertainment Hacking Presentation Data Privacy Robot Images 101 Virtual Desktop LiFi Wireless Technology Data storage Telephone System Multi-Factor Authentication Mobility Cost Management IT Management Outlook VPN Meetings Money Humor Word Computer Repair Employees Integration User Tip Sports Modem Mobile Security Mouse Processor Safety Holidays Administration Machine Learning Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Professional Services Saving Time Virtual Machines Maintenance Antivirus Settings Wireless Managed IT Service Printing Content Filtering Customer Relationship Management Downloads Break Fix Scams Alert Browsers Smartwatch Connectivity IT Upload Procurement Competition Managed IT Knowledge Azure Hybrid Work File Sharing Dark Data Google Drive How To Social Network Telework Cyber security Multi-Factor Security Tech Human Resources 5G Dark Web Cables Notifications CES IoT Communitications Unified Communications Trends Supply Chain Management Experience Travel Google Docs Bitcoin Customer Resource management FinTech Techology Running Cable Regulations User Google Maps Google Calendar Term Google Apps Microsoft Excel IT Maintenance Google Wallet Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Unified Threat Management Windows 8 Organization IP Address Unified Threat Management Laptop Social Networking Legislation Shortcuts Smart Devices Ransmoware Drones Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Network Congestion Comparison Google Play Be Proactive Health IT User Error Halloween Motherboard Data Breach Recovery Assessment Electronic Health Records Hard Drives Permissions Workforce Directions Videos Domains Wasting Time Threats Point of Sale Specifications Security Cameras Workplace Strategies Hacks Scary Stories Trend Micro Internet Exlporer Software as a Service Refrigeration Network Management Fun Fraud Meta Tech Support Microchip Deep Learning Username Public Speaking Managing Costs Amazon Monitors Black Friday SSID Lithium-ion battery eCommerce Education Database Surveillance Virtual Assistant Outsource IT Entrepreneur Websites IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Electronic Medical Records Mobile Computing Proxy Server Reviews SharePoint Cookies Tactics Development Undo Search Hotspot Transportation Small Businesses Best Practice Lenovo Mirgation Hypervisor Displays Writing PowerPoint Virtual Reality Shopping Buisness Nanotechnology Optimization IT solutions Addiction Server Management Language Employer/Employee Relationships Outsourcing Private Cloud Legal Business Growth Management PCI DSS Superfish Chatbots Identity Theft Navigation Distributed Denial of Service Workplace Twitter Gig Economy Screen Reader Application Service Level Agreement Internet Service Provider Cortana Computing Infrastructure Teamwork Hiring/Firing Error Alt Codes Regulations Compliance IBM Identity Evernote Paperless Social Engineering Co-managed IT Remote Computing Bookmark Downtime Smart Tech Memes Hosted Solution Download Net Neutrality Alerts SQL Server Technology Care Typing Financial Data History Tablet Business Communications

Blog Archive