Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Saving Money Quick Tips Passwords Communication Managed Service Cybersecurity Smartphone Data Backup Android Disaster Recovery AI Upgrade Data Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Information Miscellaneous Artificial Intelligence Holiday Automation Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship IT Support Spam Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Two-factor Authentication Data Security Vendor Apps Mobile Office Gmail Networking Chrome Managed Services Voice over Internet Protocol Employer-Employee Relationship Budget BYOD Apple App Tip of the week Mobile Device Management Computing Information Technology How To WiFi BDR Office 365 HIPAA Applications Hacker Access Control Conferencing Avoiding Downtime Marketing Risk Management Managed IT Services 2FA Big Data Analytics Office Tips Router Augmented Reality Healthcare Storage Password Bring Your Own Device Help Desk Virtual Private Network Computers Health Website Operating System Retail Cooperation Firewall Scam Data loss Windows 11 The Internet of Things Excel Social Patch Management Save Money Remote Monitoring End of Support Vulnerability Remote Workers Vendor Management Physical Security Monitoring Customer Service Display Printer Free Resource Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Going Green Telephone Document Management Solutions Cybercrime YouTube Maintenance Antivirus Cryptocurrency Telephone System Safety Holidays Cost Management Virtual Desktop Data Storage Supply Chain Data storage LiFi Video Conferencing Managed Services Provider Robot Professional Services Outlook Virtual Machines Money Humor User Tip Modem Mobile Security Processor IT Management Customer Relationship Management iPhone VPN Meetings Sports Mouse Hacking Smart Technology Vulnerabilities Presentation Computer Repair Data Privacy Administration Saving Time Images 101 Wireless Technology Mobility Multi-Factor Authentication Managed IT Service Downloads Machine Learning Settings Wireless Licensing Word Printing Content Filtering Employees Integration Entertainment Trends Public Speaking Twitter Managing Costs Amazon Google Calendar SSID Google Drive Customer Resource management Knowledge Lithium-ion battery Regulations Error eCommerce Star Wars Surveillance Microsoft Excel Social Engineering Virtual Assistant Outsource IT Entrepreneur Data Analysis Gamification 5G Staff Remote Computing Virtual Machine Environment Media Legislation Medical IT Google Docs Unified Communications Experience Reviews Social Networking Tablet Development Undo Transportation Small Businesses Bitcoin Fileless Malware Running Cable Content Wearable Technology Alert Hypervisor Displays Google Wallet Comparison Dark Data PowerPoint Health IT Managed IT Shopping Motherboard File Sharing Optimization Assessment Permissions How To Employer/Employee Relationships Outsourcing Windows 8 Directions Laptop PCI DSS Notifications Navigation Drones Application Specifications Workplace Gig Economy Travel Internet Exlporer Google Maps Internet Service Provider Fraud Teamwork Hiring/Firing Microchip Techology Halloween Username Regulations Compliance IBM Evernote Paperless Black Friday Co-managed IT Unified Threat Management Memes Database Net Neutrality SQL Server Technology Care Hacks Unified Threat Management Scary Stories Fun Financial Data IT Technicians History Business Communications Cyber Monday Network Congestion Scams Deep Learning Proxy Server Smartwatch Cookies IT Tactics Procurement Competition Hotspot Azure Hybrid Work User Error Education Telework Mirgation Cyber security Tech Human Resources Communitications Cables CES Nanotechnology Point of Sale Addiction Supply Chain Management Language Mobile Computing Term Google Apps Management Network Management Search FinTech Chatbots Tech Support User IT Assessment Distributed Denial of Service Monitors IT Maintenance Best Practice Screen Reader Buisness Service Level Agreement Flexibility Computing Infrastructure Value Business Intelligence Shortcuts Legal IT solutions Organization IP Address Identity Websites Smart Tech Smart Devices Ransmoware Business Growth Bookmark Digital Security Cameras SharePoint Download Remote Working Alerts Electronic Medical Records Memory Vendors Recovery Google Play Be Proactive Cortana Data Breach Connectivity Electronic Health Records Hard Drives Break Fix Writing Workforce Alt Codes Browsers Lenovo Videos Downtime Upload Domains Virtual Reality Wasting Time Threats Multi-Factor Security Security Cameras Workplace Strategies Hosted Solution Social Network Server Management Private Cloud Trend Micro IoT Identity Theft Software as a Service Refrigeration Dark Web Meta Typing Superfish

Blog Archive