Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Holiday Automation Artificial Intelligence Facebook Information Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Data Security Vendor Apps Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi BDR Applications Computing Information Technology Hacker Conferencing Access Control Avoiding Downtime Office 365 Marketing How To HIPAA Router Big Data Operating System 2FA Help Desk Virtual Private Network Risk Management Computers Health Healthcare Website Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Cybercrime Monitoring Physical Security Customer Service Excel Display Printer Paperless Office Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Project Management Firewall Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Employees Integration Robot Modem User Tip Processor Settings Mobile Security Printing Wireless Content Filtering Holidays IT Management Customer Relationship Management VPN YouTube Meetings Data Storage Smart Technology Supply Chain Cryptocurrency Video Conferencing Hacking Managed Services Provider Computer Repair Virtual Machines Professional Services Saving Time Presentation Virtual Desktop Managed IT Service Data storage LiFi Wireless Technology Downloads iPhone Outlook Machine Learning Licensing Money Entertainment Word Vulnerabilities Humor Data Privacy Images 101 Maintenance Antivirus Sports Multi-Factor Authentication Mobility Mouse Telephone System Cost Management Safety Administration How To Trend Micro Specifications Security Cameras Workplace Strategies Legal IT solutions Business Growth Microchip Notifications Internet Exlporer Software as a Service Fraud Meta Travel Username Application Managing Costs Amazon Cortana eCommerce Black Friday SSID Techology Google Maps Alt Codes IBM Database Surveillance Virtual Assistant Outsource IT Media Downtime Unified Threat Management IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Unified Threat Management Hosted Solution Proxy Server Reviews Typing Tactics Development Hotspot Transportation Small Businesses Network Congestion Mirgation Hypervisor Displays Knowledge Nanotechnology Optimization PowerPoint Google Drive User Error Shopping Competition Addiction Language Employer/Employee Relationships Outsourcing Navigation Point of Sale Management PCI DSS 5G Chatbots Experience Screen Reader Distributed Denial of Service Workplace Google Docs Unified Communications Gig Economy Bitcoin Network Management Running Cable Tech Support Service Level Agreement Internet Service Provider User Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Google Wallet Regulations Compliance Monitors Identity Smart Tech Memes Co-managed IT Bookmark Windows 8 IP Address Laptop Websites Download Net Neutrality Alerts SQL Server Technology Care Business Communications Drones Financial Data History Electronic Medical Records Connectivity IT Break Fix Scams SharePoint Browsers Smartwatch Halloween Upload Procurement Recovery Azure Hybrid Work Multi-Factor Security Tech Human Resources Lenovo Social Network Telework Hard Drives Writing Cyber security CES Domains Virtual Reality IoT Communitications Dark Web Cables Hacks Server Management Scary Stories Private Cloud Trends Supply Chain Management Regulations Google Calendar Term Google Apps Superfish Identity Theft Customer Resource management FinTech Refrigeration Fun Data Analysis Public Speaking Twitter Star Wars IT Assessment Microsoft Excel IT Maintenance Deep Learning Lithium-ion battery Error Gamification Flexibility Staff Value Business Intelligence Social Networking Entrepreneur Legislation Shortcuts Education Organization Social Engineering Fileless Malware Digital Security Cameras Remote Computing Smart Devices Ransmoware Mobile Computing Content Remote Working Wearable Technology Memory Vendors Search Motherboard Data Breach Comparison Google Play Be Proactive Tablet Health IT Undo Best Practice Directions Videos Alert Assessment Electronic Health Records Permissions Workforce Managed IT Buisness File Sharing Dark Data Wasting Time Threats

Blog Archive