Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Data Recovery VoIP Business Management AI Smartphones Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Covid-19 Cloud Computing Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps Tip of the week Managed Services Chrome Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR HIPAA Router Virtual Private Network Risk Management Computers 2FA Health Help Desk Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Physical Security Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Free Resource Project Management Windows 7 The Internet of Things Cooperation Microsoft 365 Social Going Green Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Presentation Computer Repair Mobile Security Holidays Processor Data Storage Virtual Desktop LiFi Wireless Technology Data storage Supply Chain Video Conferencing Smart Technology Managed Services Provider Virtual Machines Outlook Professional Services Machine Learning Money Saving Time Word Humor Managed IT Service Maintenance iPhone Antivirus Sports Downloads Mouse Licensing Vulnerabilities Data Privacy Safety Entertainment Administration Images 101 Multi-Factor Authentication Mobility Telephone System Robot Cost Management Settings Printing Wireless Content Filtering Employees Integration IT Management Customer Relationship Management Managing Costs Amazon Network Congestion Specifications Internet Exlporer Competition Knowledge Fraud eCommerce Google Drive User Error Microchip SSID Virtual Assistant Outsource IT Username Surveillance 5G Black Friday Virtual Machine Environment Media Point of Sale Unified Communications Database Experience Reviews Google Docs Medical IT Transportation Small Businesses Bitcoin Network Management Running Cable Tech Support IT Technicians User Development Monitors Cyber Monday Hypervisor Displays Google Wallet Proxy Server Cookies Tactics Hotspot Shopping Optimization PowerPoint Employer/Employee Relationships Outsourcing Windows 8 IP Address Laptop Websites Mirgation PCI DSS Drones Navigation Nanotechnology Addiction Electronic Medical Records Language Gig Economy SharePoint Workplace Teamwork Hiring/Firing Management Halloween Chatbots Recovery Internet Service Provider Writing Distributed Denial of Service Regulations Compliance Lenovo Evernote Paperless Screen Reader Hard Drives Service Level Agreement Domains Virtual Reality Computing Infrastructure Memes Co-managed IT SQL Server Technology Care Hacks Server Management Scary Stories Private Cloud Identity Net Neutrality Fun Financial Data History Superfish Bookmark Business Communications Identity Theft Smart Tech Refrigeration Deep Learning Download Public Speaking Twitter Alerts Smartwatch IT Scams Azure Hybrid Work Lithium-ion battery Error Procurement Social Engineering Break Fix Entrepreneur Telework Cyber security Browsers Tech Human Resources Education Connectivity Upload Remote Computing CES Communitications Cables Supply Chain Management Mobile Computing Social Network Multi-Factor Security Search Dark Web FinTech Term Google Apps Tablet IoT Undo IT Maintenance Best Practice Trends Alert IT Assessment Flexibility Value Business Intelligence Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Organization Legal Data Analysis Shortcuts IT solutions Star Wars Ransmoware Business Growth Gamification Notifications Staff Digital Security Cameras Smart Devices Remote Working Memory Vendors Travel Social Networking Application Legislation Cortana Data Breach Techology Fileless Malware Google Play Be Proactive Google Maps Workforce Alt Codes Content IBM Wearable Technology Videos Electronic Health Records Wasting Time Threats Health IT Downtime Unified Threat Management Motherboard Comparison Permissions Trend Micro Unified Threat Management Directions Security Cameras Workplace Strategies Hosted Solution Assessment Meta Typing Software as a Service

Blog Archive