Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Ransomware Small Business Backup Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Gadgets Covid-19 Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Vendor Two-factor Authentication Mobile Office Data Security Apps Chrome Mobile Device Management Tip of the week Managed Services Budget Voice over Internet Protocol Gmail Apple WiFi Networking App Employer-Employee Relationship BYOD Avoiding Downtime Applications Marketing Access Control Office 365 Conferencing How To BDR Computing HIPAA Hacker Information Technology Router Virtual Private Network Website Health Analytics Office Tips Augmented Reality Help Desk Storage Healthcare Retail Password Bring Your Own Device 2FA Big Data Managed IT Services Operating System Computers Risk Management Display Printer Paperless Office Infrastructure Monitoring Document Management Firewall Remote Workers Windows 11 Scam The Internet of Things Telephone Data loss Free Resource Project Management Excel Social Windows 7 Cooperation Going Green Microsoft 365 Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Cybercrime Customer Service Vendor Management Physical Security Wireless Technology Virtual Desktop Holidays Computer Repair User Tip Data storage Modem LiFi Data Storage Processor Mobile Security Outlook Video Conferencing Managed Services Provider Word Money Virtual Machines Professional Services Machine Learning Humor Smart Technology Saving Time Sports Mouse Maintenance iPhone Safety Managed IT Service Antivirus Administration Downloads Vulnerabilities Supply Chain Licensing Images 101 Entertainment Multi-Factor Authentication Mobility Robot Settings Wireless Customer Relationship Management Printing Telephone System Content Filtering Cost Management YouTube Employees Hacking IT Management Integration VPN Data Privacy Meetings Presentation Cryptocurrency Google Docs Unified Communications Specifications Experience Surveillance Virtual Assistant IT Maintenance Virtual Machine Business Intelligence Point of Sale Microchip Internet Exlporer Bitcoin Fraud Running Cable Google Wallet Reviews Medical IT Shortcuts IP Address Username Ransmoware Tech Support Black Friday Development Network Management Transportation Laptop Hypervisor Vendors Monitors Database Windows 8 Drones Recovery IT Technicians Shopping Optimization PowerPoint Be Proactive Employer/Employee Relationships Workforce Websites Proxy Server Hard Drives Cookies Cyber Monday Hotspot Halloween PCI DSS Threats Navigation Domains Tactics Mirgation Gig Economy SharePoint Workplace Strategies Electronic Medical Records Teamwork Meta Refrigeration Nanotechnology Internet Service Provider Language Scary Stories Regulations Compliance Lenovo Amazon Evernote Public Speaking Writing Addiction Hacks Management Chatbots Fun Memes Lithium-ion battery Virtual Reality SQL Server Outsource IT Private Cloud Screen Reader Deep Learning Entrepreneur Distributed Denial of Service Net Neutrality Server Management Computing Infrastructure Financial Data Superfish History Environment Identity Theft Media Service Level Agreement Identity Education Smartwatch IT Twitter Azure Small Businesses Error Bookmark Undo Smart Tech Procurement Alerts Telework Cyber security Displays Tech Social Engineering Download Mobile Computing CES Search Communitications Remote Computing Outsourcing Browsers Connectivity Best Practice Break Fix Supply Chain Management Buisness FinTech Tablet Term Upload Alert Social Network Legal Application IT solutions Multi-Factor Security IT Assessment Workplace Managed IT Value Hiring/Firing File Sharing Dark Data IoT Business Growth Dark Web Flexibility Organization Paperless IBM How To Trends Notifications Customer Resource management Regulations Digital Security Cameras Google Calendar Cortana Smart Devices Co-managed IT Memory Technology Care Travel Data Analysis Star Wars Alt Codes Microsoft Excel Remote Working Staff Downtime Techology Data Breach Google Maps Google Play Business Communications Gamification Social Networking Hosted Solution Videos Legislation Electronic Health Records Scams Wasting Time Hybrid Work Unified Threat Management Fileless Malware Competition Typing Wearable Technology Unified Threat Management Trend Micro Security Cameras Human Resources Content Health IT Google Drive Motherboard Comparison Knowledge Software as a Service Cables Managing Costs Directions Network Congestion Assessment Permissions User User Error 5G eCommerce SSID Google Apps

Blog Archive