Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Passwords Quick Tips Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones VoIP AI Data Recovery Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Windows 10 Business Technology Bandwidth Blockchain Vendor Apps Data Security Mobile Office Two-factor Authentication Managed Services Voice over Internet Protocol Apple Employer-Employee Relationship Networking App BYOD Mobile Device Management Gmail Chrome Tip of the week Budget HIPAA Applications How To BDR Hacker Computing Avoiding Downtime Conferencing Marketing Information Technology Access Control Office 365 WiFi Storage Retail Big Data Password Healthcare Bring Your Own Device Router Managed IT Services Computers Help Desk Operating System 2FA Website Risk Management Virtual Private Network Health Analytics Office Tips Augmented Reality Remote Workers Social Scam Data loss Free Resource Project Management Windows 7 Customer Service Going Green Monitoring Patch Management Save Money Microsoft 365 Windows 11 Remote Monitoring End of Support Vulnerability Cybercrime Vendor Management Solutions Excel Physical Security Display Telephone Printer Paperless Office Firewall Infrastructure Cooperation Document Management The Internet of Things Sports Maintenance Mouse Antivirus iPhone Administration Vulnerabilities Customer Relationship Management User Tip Modem Mobile Security Processor Images 101 Hacking Multi-Factor Authentication Robot Mobility Presentation Settings Smart Technology Wireless Printing Content Filtering Wireless Technology YouTube Saving Time Supply Chain IT Management Meetings Cryptocurrency VPN Employees Managed IT Service Integration Word Downloads Virtual Desktop Computer Repair Data storage LiFi Licensing Holidays Entertainment Outlook Data Storage Video Conferencing Safety Money Humor Machine Learning Managed Services Provider Virtual Machines Professional Services Telephone System Data Privacy Cost Management Evernote Content IT Maintenance Deep Learning Wearable Technology Server Management Regulations Compliance Private Cloud Comparison Identity Theft Memes Health IT Business Intelligence Motherboard Superfish Application Assessment Shortcuts Education Permissions Net Neutrality Twitter SQL Server Directions History Ransmoware Financial Data Error Smartwatch Specifications IT Social Engineering IBM Vendors Mobile Computing Internet Exlporer Be Proactive Fraud Search Procurement Remote Computing Azure Microchip Cyber security Tech Username Workforce Best Practice Telework Buisness CES Black Friday Tablet Communitications Threats Legal Database Workplace Strategies IT solutions Supply Chain Management Alert Dark Data Term Competition Meta Business Growth IT Technicians Managed IT FinTech File Sharing Cyber Monday IT Assessment How To Proxy Server Amazon Cookies Tactics Hotspot Cortana Flexibility Notifications Value Travel Outsource IT Alt Codes Mirgation Organization Techology Downtime Digital Security Cameras Google Maps Smart Devices Environment User Nanotechnology Media Addiction Hosted Solution Language Remote Working Memory Unified Threat Management Data Breach Google Play Management Small Businesses Typing Chatbots Unified Threat Management Videos Distributed Denial of Service Electronic Health Records IP Address Displays Screen Reader Google Drive Service Level Agreement Computing Infrastructure Knowledge Wasting Time Trend Micro Network Congestion Security Cameras Outsourcing Identity User Error 5G Software as a Service Bookmark Recovery Smart Tech Google Docs Hard Drives Download Workplace Unified Communications Alerts Experience Managing Costs Point of Sale eCommerce SSID Domains Hiring/Firing Bitcoin Running Cable Paperless Break Fix Surveillance Virtual Assistant Browsers Google Wallet Connectivity Refrigeration Upload Co-managed IT Network Management Tech Support Virtual Machine Monitors Medical IT Public Speaking Social Network Technology Care Windows 8 Laptop Reviews Multi-Factor Security IoT Business Communications Dark Web Development Transportation Lithium-ion battery Drones Trends Scams Entrepreneur Websites Hypervisor Google Calendar Optimization PowerPoint Customer Resource management Hybrid Work Regulations Halloween Shopping Star Wars Human Resources SharePoint Microsoft Excel Electronic Medical Records Employer/Employee Relationships Data Analysis Navigation Undo Gamification Cables Staff PCI DSS Gig Economy Legislation Writing Hacks Social Networking Lenovo Scary Stories Google Apps Fun Internet Service Provider Virtual Reality Teamwork Fileless Malware

Blog Archive