Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Small Business Collaboration Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft AI Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Holiday Automation Facebook Miscellaneous Cloud Computing Covid-19 Training Compliance Gadgets Server Remote Work Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Business Technology Windows 10 Wi-Fi Virtualization Data Security Apps Vendor Mobile Office Managed Services Two-factor Authentication Employer-Employee Relationship Chrome Budget BYOD Apple App Mobile Device Management Tip of the week Gmail Voice over Internet Protocol WiFi Networking BDR Password Hacker HIPAA Physical Security Applications Avoiding Downtime Marketing Access Control Computing Conferencing Information Technology Office 365 Managed IT Services How To Augmented Reality Storage Computers Bring Your Own Device Router Virtual Private Network Website Health Help Desk Operating System 2FA Risk Management Retail Big Data Healthcare Analytics Office Tips Free Resource Project Management Windows 7 Patch Management Save Money Customer Service Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Solutions Display Printer Going Green Paperless Office Infrastructure Windows 11 Monitoring Firewall Cybercrime Document Management Excel Managed IT Service The Internet of Things Telephone Remote Workers Scam Data loss Social Cooperation Money Data Privacy Customer Relationship Management Humor Telephone System Images 101 Robot Cost Management Multi-Factor Authentication Mobility Sports Hacking Mouse Presentation IT Management VPN Meetings Administration Wireless Technology Employees Integration User Tip Modem Computer Repair Mobile Security Processor Word Settings Holidays Printing Wireless Smart Technology Data Storage Content Filtering Supply Chain Machine Learning Video Conferencing Saving Time YouTube Managed Services Provider Professional Services Safety Virtual Machines Cryptocurrency Maintenance Antivirus Downloads Virtual Desktop Licensing Data storage LiFi iPhone Entertainment Outlook Vulnerabilities Supply Chain Management Data Analysis Star Wars How To Microsoft Excel Notifications Staff FinTech Term Google Apps Gamification Hacks IT Maintenance Scary Stories Travel Social Networking Legislation IT Assessment Flexibility Value Business Intelligence Techology Fileless Malware Google Maps Fun Competition Wearable Technology Organization Deep Learning Shortcuts Content Ransmoware Health IT Unified Threat Management Motherboard Digital Security Cameras Comparison Smart Devices Remote Working Memory Vendors Unified Threat Management Directions Education Assessment Permissions User Data Breach Google Play Be Proactive Mobile Computing Workforce Videos Network Congestion Specifications Electronic Health Records Fraud Wasting Time Threats User Error Microchip Internet Exlporer Search Username IP Address Trend Micro Best Practice Security Cameras Workplace Strategies Meta Buisness Point of Sale Black Friday Software as a Service Legal Managing Costs Amazon IT solutions Database Network Management Tech Support IT Technicians Recovery eCommerce Business Growth SSID Surveillance Virtual Assistant Outsource IT Proxy Server Cookies Hard Drives Monitors Cyber Monday Hotspot Virtual Machine Environment Media Tactics Cortana Domains Medical IT Websites Mirgation Reviews Alt Codes Development Transportation Small Businesses Downtime Nanotechnology Refrigeration Electronic Medical Records Language Hypervisor Displays SharePoint Hosted Solution Addiction Public Speaking PowerPoint Management Lithium-ion battery Chatbots Shopping Optimization Typing Employer/Employee Relationships Outsourcing Lenovo Screen Reader Writing Distributed Denial of Service Entrepreneur Virtual Reality Computing Infrastructure PCI DSS Google Drive Navigation Service Level Agreement Knowledge Workplace Server Management Private Cloud Identity Gig Economy Internet Service Provider Teamwork Hiring/Firing Superfish Bookmark Identity Theft Smart Tech 5G Undo Twitter Alerts Regulations Compliance Google Docs Unified Communications Evernote Paperless Download Experience Co-managed IT Running Cable Error Memes Bitcoin Net Neutrality Google Wallet SQL Server Technology Care Browsers Connectivity Social Engineering Break Fix Remote Computing Financial Data History Business Communications Upload Scams Social Network Laptop Application Smartwatch Multi-Factor Security IT Windows 8 Procurement Drones Azure Hybrid Work Tablet IoT Dark Web IBM Alert Telework Cyber security Tech Human Resources Trends Cables Managed IT Customer Resource management Halloween File Sharing Regulations CES Dark Data Google Calendar Communitications

Blog Archive