Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Information Facebook Artificial Intelligence Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Compliance Managed Service Provider Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Business Technology Virtualization Bandwidth Mobile Office Two-factor Authentication Vendor Apps Data Security Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Employer-Employee Relationship Apple Networking App Conferencing Hacker Avoiding Downtime Computing Marketing Information Technology Access Control Office 365 HIPAA Applications How To BDR Computers Healthcare Operating System Website Physical Security Virtual Private Network Risk Management Health Analytics Office Tips Router Augmented Reality Big Data Retail Storage Password Bring Your Own Device 2FA Help Desk Managed IT Services Going Green Patch Management Remote Workers Save Money Remote Monitoring End of Support Telephone Vulnerability Vendor Management Cybercrime Cooperation Free Resource Project Management Display Printer Windows 7 Paperless Office Firewall Infrastructure Microsoft 365 Solutions Document Management The Internet of Things Social Scam Windows 11 Data loss Monitoring Excel Customer Service Presentation Robot Managed IT Service Settings Downloads Wireless Technology Wireless Printing iPhone Content Filtering IT Management Licensing YouTube Meetings VPN Entertainment Vulnerabilities Cryptocurrency Data Privacy Word Images 101 Computer Repair Multi-Factor Authentication Virtual Desktop Mobility Telephone System Data storage Cost Management LiFi Outlook Safety Machine Learning Money Employees Humor Integration Modem User Tip Processor Maintenance Mobile Security Sports Antivirus Mouse Holidays Data Storage Administration Smart Technology Supply Chain Customer Relationship Management Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Hacking Identity Travel Evernote Paperless Regulations Compliance Bookmark Techology Smart Tech Memes Google Maps Co-managed IT Cortana User Download Net Neutrality Alt Codes Alerts SQL Server Technology Care History Downtime Unified Threat Management Business Communications Financial Data Browsers Smartwatch Unified Threat Management Connectivity IT Hosted Solution Break Fix Scams IP Address Upload Procurement Typing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Network Congestion Social Network Telework CES Google Drive User Error IoT Communitications Dark Web Cables Knowledge Recovery Hard Drives Trends Supply Chain Management Regulations Point of Sale Google Calendar Term Google Apps Domains 5G Customer Resource management FinTech Data Analysis Google Docs Star Wars IT Assessment Unified Communications Microsoft Excel IT Maintenance Experience Running Cable Tech Support Refrigeration Gamification Flexibility Bitcoin Network Management Staff Value Business Intelligence Google Wallet Social Networking Legislation Shortcuts Public Speaking Monitors Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Lithium-ion battery Laptop Websites Entrepreneur Content Remote Working Windows 8 Wearable Technology Memory Vendors Drones Motherboard Data Breach Comparison Google Play Be Proactive Health IT Directions Videos SharePoint Assessment Electronic Health Records Permissions Workforce Electronic Medical Records Halloween Undo Wasting Time Threats Lenovo Trend Micro Specifications Security Cameras Workplace Strategies Writing Microchip Internet Exlporer Software as a Service Fraud Meta Virtual Reality Scary Stories Private Cloud Username Hacks Server Management Managing Costs Amazon Superfish eCommerce Identity Theft Black Friday SSID Fun Application Database Surveillance Deep Learning Virtual Assistant Outsource IT Twitter Error Media IT Technicians Virtual Machine Environment Cookies Education Cyber Monday Medical IT IBM Social Engineering Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Remote Computing Mobile Computing Mirgation Hypervisor Displays Shopping Nanotechnology Optimization Tablet PowerPoint Search Addiction Best Practice Language Employer/Employee Relationships Outsourcing Alert Chatbots Buisness File Sharing Navigation Competition Dark Data Management PCI DSS Managed IT Gig Economy Legal Screen Reader IT solutions Distributed Denial of Service Workplace How To Service Level Agreement Internet Service Provider Business Growth Computing Infrastructure Teamwork Hiring/Firing Notifications

Blog Archive