Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Information Facebook Miscellaneous Compliance Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications How To BDR Conferencing Computers Healthcare Physical Security Risk Management Virtual Private Network Website Health Analytics Office Tips Augmented Reality Retail Storage Router Password Bring Your Own Device Big Data Managed IT Services 2FA Help Desk Operating System Telephone Display Printer Cooperation Free Resource Paperless Office Project Management Infrastructure Windows 7 Microsoft 365 Firewall Document Management Solutions Scam The Internet of Things Data loss Social Windows 11 Monitoring Going Green Patch Management Excel Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Remote Workers Cybercrime YouTube Meetings Presentation VPN Downloads Cryptocurrency iPhone Licensing Wireless Technology Computer Repair Entertainment Vulnerabilities Data Privacy Virtual Desktop Data storage LiFi Images 101 Word Telephone System Outlook Multi-Factor Authentication Mobility Cost Management Machine Learning Money Humor Safety Employees Maintenance Antivirus Integration Sports Mouse User Tip Modem Processor Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Robot Video Conferencing Customer Relationship Management Managed Services Provider Saving Time Virtual Machines Professional Services Settings Wireless Printing Content Filtering Hacking IT Management Managed IT Service Alerts SQL Server Technology Care Network Congestion Download Net Neutrality Financial Data Google Drive User Error User History Business Communications Knowledge Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Point of Sale 5G Upload Procurement IP Address Social Network Telework Google Docs Cyber security Unified Communications Multi-Factor Security Tech Human Resources Experience CES IoT Communitications Bitcoin Network Management Dark Web Cables Running Cable Tech Support Monitors Trends Supply Chain Management Google Wallet Customer Resource management FinTech Recovery Regulations Google Calendar Term Google Apps Data Analysis Hard Drives Star Wars IT Assessment Windows 8 Microsoft Excel IT Maintenance Laptop Websites Staff Value Business Intelligence Domains Gamification Flexibility Drones Organization SharePoint Social Networking Legislation Shortcuts Electronic Medical Records Fileless Malware Digital Security Cameras Refrigeration Smart Devices Ransmoware Halloween Wearable Technology Memory Vendors Writing Public Speaking Content Remote Working Lenovo Lithium-ion battery Health IT Motherboard Data Breach Comparison Google Play Be Proactive Virtual Reality Directions Videos Assessment Electronic Health Records Hacks Server Management Entrepreneur Permissions Workforce Scary Stories Private Cloud Wasting Time Threats Identity Theft Fun Superfish Trend Micro Deep Learning Specifications Security Cameras Workplace Strategies Twitter Microchip Undo Internet Exlporer Software as a Service Fraud Meta Error Managing Costs Amazon Education Social Engineering Username eCommerce Black Friday SSID Remote Computing Database Surveillance Mobile Computing Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Tablet Media Search Proxy Server Reviews Application Cookies Best Practice Cyber Monday Medical IT Alert Hotspot Transportation Small Businesses Buisness File Sharing Dark Data Tactics Development Managed IT IBM Legal Mirgation Hypervisor Displays IT solutions How To Shopping Nanotechnology Optimization Business Growth PowerPoint Notifications Language Employer/Employee Relationships Outsourcing Travel Addiction Management PCI DSS Techology Chatbots Google Maps Navigation Cortana Gig Economy Screen Reader Alt Codes Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Downtime Unified Threat Management Competition Service Level Agreement Internet Service Provider Regulations Compliance Unified Threat Management Identity Hosted Solution Evernote Paperless Bookmark Smart Tech Memes Typing Co-managed IT

Blog Archive