Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Productivity Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones VoIP AI Mobile Devices Data Recovery communications Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Automation Information Cloud Computing Miscellaneous Gadgets Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Virtualization Bandwidth Business Technology Blockchain Wi-Fi Windows 10 Data Security Two-factor Authentication Apps Mobile Office Vendor BYOD Chrome Managed Services Voice over Internet Protocol Employer-Employee Relationship Budget Apple Tip of the week App Mobile Device Management Networking Gmail Applications BDR WiFi Office 365 Conferencing Access Control Hacker Avoiding Downtime Marketing Computing HIPAA How To Information Technology 2FA Big Data Analytics Office Tips Help Desk Augmented Reality Virtual Private Network Healthcare Storage Password Bring Your Own Device Health Computers Website Retail Operating System Managed IT Services Router Risk Management Patch Management The Internet of Things Excel Save Money Remote Monitoring Vulnerability End of Support Social Vendor Management Monitoring Remote Workers Physical Security Display Printer Paperless Office Customer Service Infrastructure Telephone Free Resource Project Management Windows 7 Cooperation Document Management Microsoft 365 Going Green Solutions Scam Cybercrime Data loss Firewall Windows 11 Safety Holidays User Tip Modem Supply Chain Data Storage Processor Robot Mobile Security Virtual Desktop Data storage LiFi Video Conferencing Managed Services Provider Outlook Virtual Machines Professional Services Smart Technology IT Management VPN Meetings Money Humor Saving Time Customer Relationship Management Computer Repair iPhone Managed IT Service Sports Data Privacy Mouse Hacking Vulnerabilities Downloads Presentation Administration Licensing Images 101 Machine Learning Entertainment Wireless Technology Multi-Factor Authentication Mobility Telephone System Settings Maintenance Wireless Cost Management Word Printing Antivirus Employees Content Filtering Integration YouTube Cryptocurrency Unified Communications Displays Reviews Experience How To Username Medical IT Google Docs Notifications Undo Transportation Bitcoin Black Friday Running Cable Development Outsourcing Travel Hypervisor Database Google Wallet IT Technicians Techology Shopping Google Maps Optimization PowerPoint Proxy Server Employer/Employee Relationships Cookies Windows 8 Cyber Monday Laptop Workplace Hiring/Firing PCI DSS Unified Threat Management Tactics Navigation Drones Hotspot Mirgation Unified Threat Management Gig Economy Paperless Application Teamwork Nanotechnology Halloween Co-managed IT Internet Service Provider Technology Care Regulations Compliance IBM Network Congestion Addiction Evernote Language Chatbots User Error Business Communications Memes Management SQL Server Screen Reader Hacks Distributed Denial of Service Scary Stories Scams Net Neutrality Hybrid Work Financial Data Fun Point of Sale History Service Level Agreement Computing Infrastructure Identity Deep Learning Smartwatch Human Resources IT Procurement Tech Support Bookmark Competition Azure Smart Tech Network Management Cables Education Telework Cyber security Monitors Download Tech Alerts CES Google Apps Communitications Supply Chain Management Websites Browsers Connectivity Mobile Computing Break Fix IT Maintenance Business Intelligence FinTech Search Upload User Term Social Network Best Practice SharePoint Multi-Factor Security Shortcuts IT Assessment Electronic Medical Records Flexibility Value IoT Dark Web Buisness Ransmoware IT solutions Lenovo Vendors Organization IP Address Writing Trends Legal Customer Resource management Regulations Business Growth Google Calendar Digital Security Cameras Be Proactive Smart Devices Virtual Reality Workforce Remote Working Private Cloud Data Analysis Memory Star Wars Microsoft Excel Server Management Staff Superfish Threats Cortana Identity Theft Data Breach Gamification Recovery Google Play Hard Drives Social Networking Alt Codes Legislation Videos Workplace Strategies Electronic Health Records Twitter Meta Error Fileless Malware Domains Wasting Time Downtime Wearable Technology Hosted Solution Amazon Trend Micro Social Engineering Content Security Cameras Health IT Refrigeration Motherboard Typing Comparison Software as a Service Remote Computing Outsource IT Directions Public Speaking Managing Costs Assessment Permissions Environment Knowledge Tablet Media Lithium-ion battery eCommerce SSID Google Drive Virtual Assistant Entrepreneur Specifications Surveillance Alert Managed IT Small Businesses 5G File Sharing Microchip Virtual Machine Dark Data Internet Exlporer Fraud

Blog Archive