Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Productivity Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade Data Recovery Business Management AI VoIP Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Tech Term Current Events Network Internet of Things Remote Automation Artificial Intelligence Facebook Information Holiday Training Miscellaneous Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Employer-Employee Relationship BYOD Information Technology Avoiding Downtime Conferencing Access Control Marketing Office 365 WiFi How To HIPAA BDR Applications Computing Hacker Virtual Private Network Risk Management Website Health Healthcare Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Router Operating System 2FA Computers Help Desk Excel Display Printer Paperless Office Remote Workers Infrastructure Telephone Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Microsoft 365 Data loss Social Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Customer Service Windows 11 Vendor Management Cybercrime Monitoring Physical Security Video Conferencing Cryptocurrency Managed Services Provider Wireless Technology Saving Time Virtual Machines Professional Services Computer Repair Virtual Desktop Data storage Managed IT Service LiFi Downloads Word Outlook iPhone Machine Learning Licensing Money Entertainment Humor Vulnerabilities Data Privacy Images 101 Safety Maintenance Antivirus Sports Telephone System Multi-Factor Authentication Mouse Mobility Cost Management Administration Employees Integration Robot User Tip Modem Customer Relationship Management Settings Processor Mobile Security Printing Wireless Holidays Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Data Storage Smart Technology Supply Chain Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Point of Sale 5G Management PCI DSS Gig Economy Screen Reader IP Address Google Docs Distributed Denial of Service Workplace Unified Communications Experience Bitcoin Network Management Running Cable Tech Support Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Google Wallet Evernote Paperless Monitors Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Recovery Hard Drives Windows 8 Laptop Websites Download Net Neutrality Alerts SQL Server Technology Care History Domains Drones Business Communications Financial Data Electronic Medical Records Browsers Smartwatch Connectivity IT SharePoint Break Fix Scams Refrigeration Halloween Upload Procurement Azure Hybrid Work Cyber security Public Speaking Lenovo Multi-Factor Security Tech Human Resources Writing Social Network Telework Virtual Reality CES IoT Communitications Lithium-ion battery Dark Web Cables Hacks Server Management Entrepreneur Scary Stories Private Cloud Trends Supply Chain Management Customer Resource management FinTech Regulations Superfish Google Calendar Term Google Apps Identity Theft Fun Twitter Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Deep Learning Staff Value Business Intelligence Undo Error Gamification Flexibility Organization Social Networking Legislation Shortcuts Education Social Engineering Remote Computing Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Mobile Computing Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Tablet Search Alert Directions Videos Assessment Electronic Health Records Permissions Workforce Application Best Practice Wasting Time Threats Managed IT Buisness File Sharing Dark Data Trend Micro IBM Legal Specifications Security Cameras Workplace Strategies IT solutions How To Notifications Microchip Internet Exlporer Software as a Service Fraud Meta Business Growth Managing Costs Amazon Travel Username eCommerce Techology Black Friday SSID Google Maps Cortana Database Surveillance Virtual Assistant Outsource IT Alt Codes IT Technicians Virtual Machine Environment Competition Media Downtime Unified Threat Management Proxy Server Reviews Cookies Unified Threat Management Cyber Monday Medical IT Hosted Solution Tactics Development Hotspot Transportation Small Businesses Typing Mirgation Hypervisor Displays Network Congestion Shopping Nanotechnology Optimization Google Drive User Error PowerPoint User Knowledge

Blog Archive