Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Data Backup Managed Service Smartphone Android Upgrade AI Smartphones Business Management VoIP Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Automation Information Artificial Intelligence Facebook Training Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Government Data Management Blockchain Business Technology Wi-Fi Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security App Employer-Employee Relationship Tip of the week Networking Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail BYOD Apple Access Control HIPAA Computing Applications Hacker Information Technology Avoiding Downtime Office 365 Marketing How To BDR Conferencing WiFi Health Operating System Router Computers Risk Management Retail Website Help Desk Managed IT Services Analytics Office Tips 2FA Augmented Reality Healthcare Storage Password Bring Your Own Device Big Data Virtual Private Network Social Printer Paperless Office Solutions Going Green Infrastructure Cybercrime Document Management Customer Service Scam Data loss Monitoring Windows 11 Remote Workers Excel Firewall Patch Management Save Money Remote Monitoring Telephone End of Support Vulnerability Vendor Management Free Resource Project Management The Internet of Things Windows 7 Physical Security Cooperation Display Microsoft 365 Data Privacy Computer Repair Telephone System Cost Management Employees Settings Wireless Customer Relationship Management Integration Printing Content Filtering Machine Learning YouTube Hacking Holidays Presentation Cryptocurrency User Tip Modem Mobile Security Maintenance Processor Data Storage Wireless Technology Antivirus Virtual Desktop Video Conferencing Data storage LiFi Managed Services Provider Virtual Machines Professional Services Smart Technology Outlook Supply Chain Word Saving Time Money Humor Robot iPhone Managed IT Service Vulnerabilities Downloads Sports Mouse Safety Licensing IT Management Meetings VPN Images 101 Administration Entertainment Mobility Multi-Factor Authentication Legal IT solutions Data Analysis Remote Working Star Wars Memory Application Microsoft Excel Data Breach Staff Google Play Business Growth Network Management Tech Support Google Apps Gamification Videos IT Maintenance Electronic Health Records Monitors IBM Social Networking Legislation Business Intelligence Fileless Malware Cortana Wasting Time Content Trend Micro Wearable Technology Security Cameras Alt Codes Websites Shortcuts Downtime Ransmoware Health IT Software as a Service Motherboard Comparison Permissions SharePoint Hosted Solution Vendors Directions Electronic Medical Records Assessment Managing Costs eCommerce Competition SSID Typing Be Proactive Workforce Surveillance Writing Virtual Assistant Specifications Lenovo Fraud Google Drive Threats Microchip Knowledge Virtual Reality Internet Exlporer Virtual Machine Username Medical IT Server Management Reviews Private Cloud Workplace Strategies Identity Theft Meta Development 5G Transportation User Black Friday Superfish Google Docs Unified Communications Amazon Experience Twitter Database Hypervisor Optimization IT Technicians PowerPoint Bitcoin Shopping Running Cable Error Outsource IT Proxy Server Social Engineering IP Address Cookies Employer/Employee Relationships Cyber Monday Google Wallet Hotspot Navigation Environment PCI DSS Remote Computing Media Tactics Mirgation Windows 8 Gig Economy Laptop Tablet Small Businesses Internet Service Provider Nanotechnology Teamwork Recovery Drones Language Evernote Displays Regulations Compliance Alert Addiction Hard Drives Management Memes Dark Data Domains Chatbots Managed IT Halloween File Sharing Outsourcing Net Neutrality How To Screen Reader SQL Server Distributed Denial of Service Refrigeration Computing Infrastructure Financial Data Notifications Service Level Agreement History Travel Workplace IT Public Speaking Identity Hacks Smartwatch Scary Stories Techology Google Maps Hiring/Firing Bookmark Procurement Fun Lithium-ion battery Smart Tech Azure Alerts Tech Entrepreneur Deep Learning Telework Paperless Download Cyber security Unified Threat Management Co-managed IT Communitications CES Unified Threat Management Education Technology Care Browsers Supply Chain Management Connectivity Break Fix Undo Term FinTech Business Communications Upload Scams Social Network IT Assessment Network Congestion Multi-Factor Security Mobile Computing User Error Hybrid Work Flexibility Search IoT Value Dark Web Best Practice Organization Human Resources Trends Digital Security Cameras Buisness Point of Sale Cables Customer Resource management Smart Devices Regulations Google Calendar

Blog Archive