Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Cloud Computing Gadgets Covid-19 Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget Networking WiFi Apple App BYOD Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol How To BDR HIPAA Applications Computing Hacker Access Control Information Technology Avoiding Downtime Marketing Conferencing Office 365 Analytics Office Tips Healthcare Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data Router Virtual Private Network Operating System Computers Health 2FA Help Desk Risk Management Website Retail Telephone Scam Firewall Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring Social End of Support Vulnerability Vendor Management Solutions Going Green Physical Security Display Customer Service Printer Cybercrime Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Maintenance Outlook Downloads Antivirus iPhone Money Licensing Humor Vulnerabilities Entertainment Data Privacy Safety Sports Mouse Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Administration IT Management VPN Employees Meetings Integration Customer Relationship Management Settings Wireless Printing User Tip Modem Content Filtering Computer Repair Mobile Security Processor Hacking Presentation YouTube Holidays Cryptocurrency Data Storage Smart Technology Supply Chain Wireless Technology Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Desktop Virtual Machines LiFi Data storage Managed IT Service Word Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Refrigeration Financial Data Halloween Error History Connectivity IT Social Engineering Break Fix Scams Public Speaking Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work Lithium-ion battery Multi-Factor Security Tech Human Resources Hacks Social Network Telework Entrepreneur Scary Stories Cyber security Tablet IoT Communitications Fun Dark Web Cables CES Deep Learning Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Undo Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Education Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Mobile Computing Organization Travel Social Networking Google Maps Smart Devices Search Ransmoware Techology Fileless Malware Digital Security Cameras Application Best Practice Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Buisness Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce IBM Legal Unified Threat Management Directions Videos IT solutions Business Growth Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Cortana Fraud Meta User Error Microchip Alt Codes Username Managing Costs Amazon Black Friday SSID Competition Downtime Point of Sale eCommerce Hosted Solution Database Surveillance Virtual Assistant Outsource IT Typing Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies User Tactics Development Knowledge Hotspot Transportation Small Businesses Google Drive Websites Mirgation Hypervisor Displays 5G PowerPoint Shopping Nanotechnology Optimization Unified Communications Addiction Experience Electronic Medical Records Language Employer/Employee Relationships Outsourcing IP Address Google Docs SharePoint Bitcoin Management PCI DSS Running Cable Chatbots Navigation Writing Distributed Denial of Service Workplace Google Wallet Lenovo Gig Economy Screen Reader Recovery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Hard Drives Windows 8 Server Management Regulations Compliance Laptop Private Cloud Identity Evernote Paperless Identity Theft Smart Tech Memes Co-managed IT Domains Drones Superfish Bookmark

Blog Archive