Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Communication Cybersecurity Productivity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Facebook Automation Artificial Intelligence Information Cloud Computing Holiday Miscellaneous Gadgets Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Spam IT Support Encryption Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Vendor Two-factor Authentication Apps Mobile Office Data Security Gmail BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome Tip of the week Budget Apple Networking Mobile Device Management App Applications Computing WiFi Information Technology Office 365 Access Control Conferencing Hacker Avoiding Downtime Marketing How To BDR HIPAA Router Operating System Risk Management Big Data Virtual Private Network Help Desk Healthcare Health Analytics Office Tips Augmented Reality Computers Storage Password Retail Bring Your Own Device Website 2FA Managed IT Services Patch Management Save Money Remote Monitoring Vulnerability End of Support Cybercrime Vendor Management The Internet of Things Physical Security Social Monitoring Remote Workers Display Printer Paperless Office Infrastructure Free Resource Customer Service Telephone Project Management Windows 7 Document Management Microsoft 365 Cooperation Solutions Windows 11 Scam Data loss Excel Firewall Going Green Holidays Robot Settings Wireless Printing Data Storage Content Filtering Safety User Tip Modem YouTube Mobile Security Processor Video Conferencing IT Management Managed Services Provider VPN Meetings Cryptocurrency Virtual Machines Professional Services Data Privacy Smart Technology Computer Repair Virtual Desktop Data storage LiFi Saving Time iPhone Customer Relationship Management Outlook Managed IT Service Vulnerabilities Money Hacking Humor Machine Learning Downloads Presentation Images 101 Licensing Multi-Factor Authentication Mobility Sports Wireless Technology Entertainment Mouse Maintenance Antivirus Administration Employees Telephone System Cost Management Integration Supply Chain Word Specifications Paperless Reviews Travel Entrepreneur Alt Codes Medical IT Internet Exlporer Downtime Transportation Fraud Co-managed IT Techology Google Maps Microchip Development Username Hosted Solution Hypervisor Technology Care Black Friday Business Communications Undo Shopping Unified Threat Management Typing Optimization PowerPoint Database Employer/Employee Relationships Scams Unified Threat Management Google Drive PCI DSS IT Technicians Knowledge Navigation Hybrid Work Cyber Monday Human Resources Gig Economy Proxy Server Network Congestion Cookies Tactics Teamwork Hotspot 5G Cables User Error Internet Service Provider Application Google Docs Regulations Compliance Unified Communications Mirgation Experience Evernote Google Apps Point of Sale Bitcoin Memes Nanotechnology Running Cable Addiction SQL Server Language IT Maintenance IBM Google Wallet Net Neutrality Network Management Financial Data Tech Support Management History Chatbots Business Intelligence Distributed Denial of Service Shortcuts Smartwatch Windows 8 IT Monitors Screen Reader Laptop Service Level Agreement Azure Computing Infrastructure Ransmoware Drones Procurement Telework Websites Cyber security Identity Tech Vendors Be Proactive Competition CES Bookmark Communitications Smart Tech Halloween Supply Chain Management Electronic Medical Records Download Alerts Workforce SharePoint FinTech Term Threats Break Fix Workplace Strategies Lenovo Browsers Hacks IT Assessment Writing Connectivity Scary Stories Flexibility Virtual Reality Upload Value Fun Meta User Server Management Organization Private Cloud Social Network Deep Learning Amazon Multi-Factor Security IoT Dark Web Superfish Digital Security Cameras Identity Theft Smart Devices Remote Working Twitter Trends Education Memory Outsource IT IP Address Google Calendar Media Error Customer Resource management Data Breach Regulations Google Play Environment Star Wars Microsoft Excel Videos Data Analysis Mobile Computing Electronic Health Records Social Engineering Recovery Remote Computing Gamification Wasting Time Staff Search Small Businesses Displays Legislation Hard Drives Best Practice Trend Micro Social Networking Security Cameras Buisness Domains Tablet Fileless Malware Software as a Service Legal Alert Content IT solutions Managing Costs Wearable Technology Outsourcing Comparison Managed IT Refrigeration File Sharing Health IT Business Growth eCommerce Dark Data Motherboard SSID How To Assessment Virtual Assistant Permissions Workplace Public Speaking Directions Surveillance Notifications Virtual Machine Cortana Hiring/Firing Lithium-ion battery

Blog Archive