Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Workplace Tips Privacy Google Email Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Managed Service Ransomware AI Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Managed IT Services How To BDR HIPAA Applications Computing Hacker Physical Security Information Technology Avoiding Downtime Access Control Marketing Conferencing Office 365 Password Big Data Router Operating System Computers 2FA Virtual Private Network Risk Management Help Desk Website Health Analytics Office Tips Healthcare Augmented Reality Retail Storage Bring Your Own Device Microsoft 365 Social Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Windows 11 Monitoring Display Printer Excel Paperless Office Infrastructure Managed IT Service Remote Workers Telephone Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Data loss Telephone System Multi-Factor Authentication Mobility Administration Cost Management Employees Robot Integration Customer Relationship Management Settings Printing User Tip Wireless Modem Mobile Security Processor Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Holidays Data Storage Cryptocurrency Smart Technology Supply Chain Wireless Technology Video Conferencing Computer Repair Managed Services Provider Professional Services Virtual Desktop Saving Time Virtual Machines Data storage LiFi Word Outlook Machine Learning Downloads iPhone Money Licensing Humor Vulnerabilities Entertainment Data Privacy Safety Maintenance Antivirus Sports Mouse Images 101 Mobile Computing Organization Social Networking Legislation Shortcuts Ransmoware Tablet Fileless Malware Digital Security Cameras Search Smart Devices Alert Content Remote Working Wearable Technology Memory Vendors Application Best Practice Managed IT Buisness File Sharing Health IT Dark Data Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce IBM Legal IT solutions Directions Videos How To Assessment Electronic Health Records Notifications Wasting Time Threats Business Growth Travel Trend Micro Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Fraud Meta Techology Google Maps Microchip Cortana Username Managing Costs Amazon Alt Codes Black Friday SSID Competition Downtime Unified Threat Management eCommerce Database Surveillance Virtual Assistant Outsource IT Unified Threat Management Hosted Solution IT Technicians Virtual Machine Environment Media Typing Cyber Monday Medical IT Proxy Server Reviews Network Congestion Cookies Tactics Development Hotspot Transportation Small Businesses Google Drive User Error User Knowledge Mirgation Hypervisor Displays PowerPoint Point of Sale Shopping 5G Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing IP Address Google Docs Unified Communications Experience Running Cable Tech Support Management PCI DSS Chatbots Navigation Bitcoin Network Management Distributed Denial of Service Workplace Google Wallet Gig Economy Monitors Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Recovery Laptop Websites Regulations Compliance Identity Evernote Paperless Hard Drives Windows 8 Co-managed IT Domains Drones Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care SharePoint Electronic Medical Records Halloween Financial Data History Business Communications Refrigeration Break Fix Scams Public Speaking Lenovo Browsers Smartwatch Writing Connectivity IT Upload Procurement Azure Hybrid Work Lithium-ion battery Virtual Reality Entrepreneur Scary Stories Private Cloud Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Hacks Server Management Dark Web Cables Superfish Identity Theft CES Fun IoT Communitications Trends Supply Chain Management Deep Learning Twitter Undo Error Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Education Data Analysis Social Engineering Star Wars IT Assessment Remote Computing Gamification Flexibility Staff Value Business Intelligence

Blog Archive