Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade Business Management Smartphones AI VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Automation Facebook Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption IT Support Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Apps Data Security BYOD Mobile Device Management Managed Services Voice over Internet Protocol Gmail Tip of the week Chrome Budget Employer-Employee Relationship Networking Apple App Avoiding Downtime Marketing Computing Access Control Information Technology HIPAA Applications WiFi Office 365 How To Conferencing BDR Hacker Website Operating System Virtual Private Network Health Risk Management Router Healthcare Office Tips Analytics Big Data Retail Augmented Reality Help Desk 2FA Storage Password Managed IT Services Bring Your Own Device Computers Going Green Vendor Management Cooperation Physical Security Display Cybercrime Printer Paperless Office Firewall Remote Workers Infrastructure Document Management The Internet of Things Free Resource Project Management Windows 11 Monitoring Windows 7 Social Scam Data loss Microsoft 365 Excel Solutions Customer Service Telephone Patch Management Save Money Remote Monitoring End of Support Vulnerability Holidays IT Management Meetings Settings VPN Data Storage Data Privacy Printing Wireless Content Filtering Video Conferencing Telephone System Managed Services Provider Cost Management Word Virtual Machines Computer Repair Professional Services YouTube Cryptocurrency Safety iPhone Virtual Desktop Modem Data storage User Tip Machine Learning LiFi Processor Mobile Security Vulnerabilities Outlook Images 101 Maintenance Money Smart Technology Antivirus Humor Multi-Factor Authentication Mobility Supply Chain Saving Time Customer Relationship Management Sports Mouse Managed IT Service Employees Downloads Integration Administration Hacking Presentation Robot Licensing Wireless Technology Entertainment Unified Threat Management Reviews IP Address Human Resources Trends Medical IT Cortana Google Calendar Development Cables Customer Resource management Transportation Regulations Hypervisor Alt Codes Star Wars Network Congestion Microsoft Excel Data Analysis User Error Shopping Optimization Google Apps Gamification PowerPoint Downtime Recovery Staff Legislation IT Maintenance Employer/Employee Relationships Hosted Solution Hard Drives Social Networking Point of Sale Typing Domains Navigation PCI DSS Business Intelligence Fileless Malware Gig Economy Shortcuts Content Wearable Technology Knowledge Comparison Network Management Internet Service Provider Google Drive Ransmoware Health IT Tech Support Teamwork Refrigeration Motherboard Public Speaking Assessment Monitors Evernote Permissions Regulations Compliance Vendors Directions Memes Lithium-ion battery Be Proactive 5G Experience Entrepreneur Specifications Net Neutrality Google Docs Workforce Websites SQL Server Unified Communications Threats Microchip History Bitcoin Internet Exlporer Running Cable Fraud Financial Data SharePoint Smartwatch IT Google Wallet Workplace Strategies Username Electronic Medical Records Black Friday Procurement Meta Azure Undo Amazon Cyber security Windows 8 Database Writing Tech Laptop Lenovo Telework CES Communitications Drones Virtual Reality IT Technicians Cookies Cyber Monday Server Management Supply Chain Management Outsource IT Proxy Server Private Cloud Environment Identity Theft Media Tactics Term Halloween Hotspot Superfish FinTech IT Assessment Twitter Application Mirgation Nanotechnology Flexibility Small Businesses Error Value Displays Hacks IBM Addiction Social Engineering Scary Stories Language Organization Digital Security Cameras Smart Devices Management Remote Computing Chatbots Fun Deep Learning Screen Reader Distributed Denial of Service Remote Working Outsourcing Memory Tablet Data Breach Service Level Agreement Google Play Computing Infrastructure Videos Electronic Health Records Workplace Alert Education Identity Competition Smart Tech Dark Data Managed IT Hiring/Firing Bookmark File Sharing Wasting Time Trend Micro Mobile Computing Paperless Download How To Security Cameras Alerts Search Software as a Service Co-managed IT Notifications Best Practice Connectivity Break Fix Technology Care Browsers Travel Managing Costs Techology Google Maps eCommerce Business Communications Upload SSID Buisness User Multi-Factor Security Surveillance Legal Scams Social Network Virtual Assistant IT solutions Unified Threat Management Virtual Machine Business Growth IoT Dark Web Hybrid Work

Blog Archive