Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Artificial Intelligence Information Holiday Automation Gadgets Cloud Computing Covid-19 Training Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Bandwidth Blockchain Windows 10 Business Technology Wi-Fi Two-factor Authentication Apps Data Security Vendor Mobile Office Managed Services Voice over Internet Protocol WiFi Networking Chrome Employer-Employee Relationship Budget BYOD Apple App Mobile Device Management Gmail Tip of the week Conferencing Office 365 How To BDR Hacker HIPAA Avoiding Downtime Applications Marketing Access Control Computing Information Technology Retail Healthcare Big Data Office Tips Analytics Managed IT Services Augmented Reality Storage Password Computers Bring Your Own Device Router Website Virtual Private Network Health Operating System 2FA Help Desk Risk Management The Internet of Things Remote Workers Telephone Social Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Customer Service Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Display Going Green Printer Windows 11 Paperless Office Infrastructure Monitoring Firewall Cybercrime Excel Document Management Managed IT Service Maintenance Virtual Desktop Downloads Antivirus Data storage LiFi iPhone Licensing Outlook Vulnerabilities Entertainment Money Data Privacy Humor Customer Relationship Management Images 101 Mobility Telephone System Multi-Factor Authentication Robot Cost Management Hacking Sports Mouse Presentation IT Management Wireless Technology Administration VPN Employees Meetings Integration User Tip Modem Computer Repair Mobile Security Processor Word Settings Holidays Printing Wireless Content Filtering Data Storage Smart Technology Supply Chain Video Conferencing YouTube Machine Learning Managed Services Provider Safety Cryptocurrency Professional Services Saving Time Virtual Machines Experience Server Management Regulations Compliance Private Cloud Google Docs Identity Unified Communications Evernote Paperless Smart Tech Memes Bitcoin Co-managed IT Running Cable Superfish Bookmark Identity Theft Download Net Neutrality Twitter Google Wallet Alerts SQL Server Technology Care Business Communications Financial Data Error History Connectivity IT Social Engineering Windows 8 Break Fix Scams Application Laptop Browsers Smartwatch Upload Procurement Remote Computing Drones Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security IBM IoT Communitications Dark Web Cables Halloween CES Tablet Trends Supply Chain Management Alert Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Star Wars IT Assessment How To Hacks Microsoft Excel IT Maintenance Scary Stories Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Competition Fun Legislation Shortcuts Organization Travel Social Networking Deep Learning Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Content Remote Working Wearable Technology Memory Vendors Education Comparison Google Play Be Proactive User Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Mobile Computing Permissions Workforce Unified Threat Management Directions Videos Wasting Time Threats Search Specifications Security Cameras Workplace Strategies Trend Micro Network Congestion IP Address Best Practice Internet Exlporer Software as a Service Fraud Meta Buisness User Error Microchip Username Legal Managing Costs Amazon IT solutions Black Friday SSID Recovery Point of Sale eCommerce Business Growth Database Surveillance Virtual Assistant Outsource IT Hard Drives Network Management Tech Support IT Technicians Virtual Machine Environment Domains Media Cortana Alt Codes Cyber Monday Medical IT Proxy Server Reviews Cookies Monitors Tactics Development Hotspot Transportation Small Businesses Refrigeration Downtime Websites Mirgation Hypervisor Displays Public Speaking Hosted Solution Lithium-ion battery Typing PowerPoint Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Entrepreneur SharePoint Knowledge Management PCI DSS Google Drive Chatbots Navigation Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Writing Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Undo 5G

Blog Archive