Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones Disaster Recovery AI VoIP Data Recovery Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Automation Facebook Artificial Intelligence Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Business Technology Wi-Fi Windows 10 Virtualization Data Security Apps Vendor Mobile Office Two-factor Authentication Budget Employer-Employee Relationship BYOD Apple App Tip of the week Mobile Device Management Managed Services Voice over Internet Protocol Gmail Networking Chrome BDR HIPAA Applications Hacker Avoiding Downtime Access Control Marketing Computing Information Technology Conferencing Office 365 WiFi How To Storage Password Bring Your Own Device Router Computers Virtual Private Network Health 2FA Website Operating System Help Desk Risk Management Retail Healthcare Analytics Office Tips Managed IT Services Augmented Reality Big Data Windows 7 Social Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Customer Service Physical Security Display Printer Going Green Paperless Office Windows 11 Infrastructure Monitoring Cybercrime Excel Document Management Firewall Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Sports Mouse Customer Relationship Management Administration IT Management Meetings VPN Employees Hacking Integration Presentation Modem User Tip Processor Computer Repair Mobile Security Wireless Technology Holidays Settings Wireless Printing Content Filtering Data Storage Smart Technology Supply Chain Video Conferencing YouTube Machine Learning Managed Services Provider Word Virtual Machines Professional Services Cryptocurrency Saving Time Managed IT Service Maintenance Virtual Desktop Downloads LiFi Antivirus Data storage Safety iPhone Licensing Outlook Vulnerabilities Entertainment Data Privacy Money Humor Star Wars IT Assessment Application How To Microsoft Excel IT Maintenance Hacks Scary Stories Data Analysis Fun Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Deep Learning Organization IBM Travel Social Networking Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Education Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Mobile Computing Search Competition Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Best Practice User Error Microchip Internet Exlporer Software as a Service Fraud Meta Buisness IT solutions Username Managing Costs Amazon Legal Point of Sale eCommerce User Black Friday SSID Business Growth Database Surveillance Virtual Assistant Outsource IT Media Cortana Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Alt Codes Proxy Server Reviews IP Address Tactics Development Hotspot Transportation Small Businesses Downtime Hosted Solution Websites Mirgation Hypervisor Displays Nanotechnology Optimization Recovery PowerPoint Typing Shopping SharePoint Addiction Hard Drives Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Knowledge Management PCI DSS Domains Chatbots Google Drive Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy 5G Service Level Agreement Internet Service Provider Refrigeration Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Unified Communications Experience Server Management Regulations Compliance Public Speaking Private Cloud Identity Google Docs Lithium-ion battery Identity Theft Smart Tech Memes Co-managed IT Bitcoin Running Cable Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Google Wallet Entrepreneur Business Communications Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Windows 8 Laptop Browsers Smartwatch Upload Procurement Undo Remote Computing Azure Hybrid Work Drones Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables Halloween CES Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations

Blog Archive