Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Information Covid-19 Miscellaneous Cloud Computing Gadgets Holiday Training Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Blockchain Bandwidth Virtualization Mobile Office Two-factor Authentication Data Security Vendor Apps Managed Services Voice over Internet Protocol Tip of the week Mobile Device Management Gmail Networking Chrome Budget Apple BYOD Employer-Employee Relationship App Hacker Access Control Conferencing Computing Avoiding Downtime Information Technology Marketing Office 365 How To BDR HIPAA WiFi Applications Computers Health Operating System Healthcare Website Risk Management Retail Office Tips Analytics Managed IT Services Augmented Reality Router Storage Password Big Data Bring Your Own Device 2FA Help Desk Virtual Private Network Paperless Office Infrastructure Cybercrime Remote Workers Telephone Document Management Free Resource Cooperation Project Management Firewall Scam Windows 7 Data loss Microsoft 365 The Internet of Things Solutions Patch Management Save Money Remote Monitoring Social End of Support Vulnerability Vendor Management Windows 11 Physical Security Monitoring Display Going Green Customer Service Printer Excel Settings Saving Time Virtual Machines Professional Services Presentation Printing Wireless Content Filtering Wireless Technology Managed IT Service YouTube Downloads Machine Learning Cryptocurrency iPhone Licensing Word Entertainment Vulnerabilities Data Privacy Maintenance Virtual Desktop Antivirus Data storage LiFi Images 101 Telephone System Multi-Factor Authentication Outlook Mobility Cost Management Money Safety Humor Robot Employees Integration Sports Mouse User Tip Modem Mobile Security Processor IT Management Administration Holidays VPN Meetings Customer Relationship Management Data Storage Supply Chain Smart Technology Computer Repair Video Conferencing Managed Services Provider Hacking Monitors Gig Economy Screen Reader Workplace Distributed Denial of Service Alt Codes Teamwork Hiring/Firing Computing Infrastructure Downtime User Internet Service Provider Service Level Agreement Regulations Compliance Identity Evernote Paperless Websites Hosted Solution Typing Bookmark Memes Smart Tech Co-managed IT SQL Server Technology Care Alerts IP Address Electronic Medical Records Net Neutrality Download SharePoint Knowledge Financial Data History Google Drive Business Communications Writing Smartwatch Browsers IT Connectivity Lenovo Scams Break Fix Azure Hybrid Work Virtual Reality Recovery 5G Procurement Upload Experience Telework Social Network Cyber security Server Management Google Docs Tech Human Resources Multi-Factor Security Private Cloud Unified Communications Hard Drives Bitcoin Domains Running Cable CES Communitications IoT Superfish Cables Dark Web Identity Theft Google Wallet Twitter Supply Chain Management Trends FinTech Customer Resource management Regulations Term Google Apps Google Calendar Error Refrigeration Windows 8 Public Speaking Social Engineering Laptop Data Analysis IT Assessment Star Wars IT Maintenance Microsoft Excel Gamification Value Business Intelligence Staff Drones Lithium-ion battery Remote Computing Flexibility Entrepreneur Organization Social Networking Shortcuts Legislation Tablet Halloween Digital Security Cameras Fileless Malware Smart Devices Ransmoware Content Memory Vendors Wearable Technology Alert Remote Working Dark Data Health IT Data Breach Motherboard Managed IT Google Play Be Proactive Comparison File Sharing Undo Permissions Hacks How To Scary Stories Videos Directions Electronic Health Records Assessment Workforce Wasting Time Threats Notifications Fun Trend Micro Security Cameras Workplace Strategies Specifications Travel Deep Learning Meta Fraud Google Maps Microchip Software as a Service Internet Exlporer Techology Username Managing Costs Amazon Education Application eCommerce SSID Black Friday Unified Threat Management Virtual Assistant Outsource IT Mobile Computing IBM Surveillance Database Unified Threat Management Virtual Machine Environment IT Technicians Media Search Network Congestion Reviews Proxy Server Cookies Medical IT Cyber Monday Best Practice Transportation Small Businesses Hotspot Buisness Development Tactics User Error Hypervisor Displays Mirgation Legal IT solutions Shopping Optimization Nanotechnology PowerPoint Point of Sale Business Growth Competition Employer/Employee Relationships Outsourcing Language Addiction PCI DSS Management Chatbots Network Management Navigation Tech Support Cortana

Blog Archive