Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade Disaster Recovery Data Recovery VoIP AI Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Computing Information Technology Hacker Access Control Avoiding Downtime Conferencing Office 365 Marketing How To WiFi BDR HIPAA Applications 2FA Risk Management Help Desk Virtual Private Network Computers Health Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Operating System Windows 11 Physical Security Monitoring Customer Service Display Printer Excel Paperless Office Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Firewall Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime YouTube Meetings Holidays VPN Data Storage Cryptocurrency Hacking Smart Technology Supply Chain Presentation Computer Repair Video Conferencing Managed Services Provider Virtual Desktop Saving Time Virtual Machines Professional Services Data storage LiFi Wireless Technology Managed IT Service Outlook Downloads Machine Learning Money iPhone Licensing Humor Word Vulnerabilities Entertainment Data Privacy Maintenance Sports Antivirus Mouse Images 101 Telephone System Multi-Factor Authentication Mobility Safety Administration Cost Management Robot Employees Integration Settings Wireless User Tip Modem Printing Mobile Security Content Filtering Processor IT Management Customer Relationship Management Network Congestion Proxy Server Reviews Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Google Drive User Error Competition Knowledge Tactics Development Mirgation Hypervisor Displays Point of Sale 5G Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Google Docs Unified Communications Experience Addiction User Management PCI DSS Chatbots Navigation Bitcoin Network Management Running Cable Tech Support Monitors Gig Economy Screen Reader Distributed Denial of Service Workplace Google Wallet Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Windows 8 IP Address Laptop Websites Bookmark Smart Tech Memes Co-managed IT Drones Alerts SQL Server Technology Care SharePoint Electronic Medical Records Download Net Neutrality Recovery Financial Data History Business Communications Halloween Lenovo Hard Drives Writing Browsers Smartwatch Connectivity IT Break Fix Scams Upload Procurement Azure Hybrid Work Domains Virtual Reality Scary Stories Private Cloud Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Hacks Server Management Dark Web Cables Superfish Identity Theft Refrigeration Fun CES IoT Communitications Trends Supply Chain Management Deep Learning Public Speaking Twitter Error Customer Resource management FinTech Regulations Google Calendar Term Google Apps Lithium-ion battery Microsoft Excel IT Maintenance Education Social Engineering Data Analysis Entrepreneur Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Remote Computing Organization Social Networking Legislation Shortcuts Mobile Computing Ransmoware Tablet Undo Search Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Best Practice Alert Buisness File Sharing Dark Data Health IT Motherboard Data Breach Comparison Google Play Be Proactive Managed IT Permissions Workforce Legal IT solutions How To Directions Videos Assessment Electronic Health Records Wasting Time Threats Business Growth Notifications Travel Application Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Techology Google Maps Cortana Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Alt Codes IBM Downtime Unified Threat Management eCommerce Black Friday SSID Virtual Assistant Outsource IT Unified Threat Management Hosted Solution Database Surveillance IT Technicians Virtual Machine Environment Media Typing

Blog Archive