Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR Operating System Computers Router Physical Security Virtual Private Network Risk Management Website Health Help Desk Office Tips 2FA Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Customer Service Vendor Management Cybercrime Solutions Display Printer Paperless Office Infrastructure Monitoring Windows 11 Firewall Document Management Excel Telephone Remote Workers The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Employees Cryptocurrency Wireless Technology User Tip Modem Integration Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Holidays Word Smart Technology Outlook Data Storage Machine Learning Supply Chain Money Saving Time Video Conferencing Managed Services Provider Humor Virtual Machines Professional Services Managed IT Service Safety Maintenance Antivirus Sports Downloads Mouse Licensing iPhone Entertainment Administration Vulnerabilities Data Privacy Telephone System Images 101 Robot Customer Relationship Management Cost Management Settings Multi-Factor Authentication Mobility Printing Wireless Memory Vendors Unified Threat Management Directions Hosted Solution Assessment Remote Working Permissions Data Breach Google Play Be Proactive Typing Videos Electronic Health Records Network Congestion Specifications Workforce Wasting Time Threats Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Trend Micro Security Cameras Workplace Strategies Username Point of Sale Software as a Service 5G Black Friday Meta Managing Costs Amazon IP Address Google Docs Unified Communications Database Experience Running Cable Tech Support IT Technicians eCommerce SSID Bitcoin Network Management Google Wallet Proxy Server Cookies Surveillance Monitors Cyber Monday Virtual Assistant Outsource IT Virtual Machine Environment Media Recovery Tactics Hotspot Windows 8 Reviews Laptop Websites Mirgation Medical IT Hard Drives Domains Drones Nanotechnology Development Transportation Small Businesses Electronic Medical Records Language Hypervisor Displays SharePoint Addiction Refrigeration Management Shopping Halloween Chatbots Optimization PowerPoint Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Employer/Employee Relationships Outsourcing PCI DSS Virtual Reality Computing Infrastructure Navigation Lithium-ion battery Service Level Agreement Hacks Server Management Entrepreneur Gig Economy Scary Stories Private Cloud Identity Workplace Teamwork Hiring/Firing Superfish Bookmark Identity Theft Smart Tech Internet Service Provider Fun Regulations Compliance Twitter Alerts Evernote Paperless Deep Learning Download Undo Error Memes Co-managed IT SQL Server Technology Care Browsers Education Connectivity Net Neutrality Social Engineering Break Fix Financial Data Remote Computing History Business Communications Upload Mobile Computing Social Network Smartwatch IT Multi-Factor Security Scams Azure Hybrid Work Tablet IoT Procurement Search Dark Web Telework Alert Cyber security Tech Human Resources Application Best Practice Trends Managed IT Customer Resource management CES Buisness File Sharing Regulations Communitications Dark Data Google Calendar Cables IBM Legal Data Analysis IT solutions Star Wars Supply Chain Management How To Microsoft Excel FinTech Notifications Staff Term Google Apps Business Growth Gamification Travel Social Networking IT Assessment Legislation IT Maintenance Value Business Intelligence Techology Fileless Malware Google Maps Flexibility Cortana Organization Wearable Technology Shortcuts Alt Codes Content Competition Health IT Digital Security Cameras Downtime Unified Threat Management Motherboard Smart Devices Comparison Ransmoware

Blog Archive