Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Managed Service Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Remote Work Server Compliance Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Wi-Fi Business Technology Windows 10 Blockchain Vendor Data Security Apps Two-factor Authentication Mobile Office Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome HIPAA Applications How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 Retail Storage Password Router Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Operating System Computers Physical Security Virtual Private Network Risk Management Healthcare Website Health Analytics Office Tips Augmented Reality Solutions The Internet of Things Scam Data loss Social Windows 11 Monitoring Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Excel Vendor Management Customer Service Cybercrime Remote Workers Display Telephone Printer Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Firewall Document Management Microsoft 365 Maintenance Safety Antivirus Sports Employees Mouse Integration User Tip Modem Administration Mobile Security Processor Holidays Robot Data Storage Smart Technology Supply Chain Customer Relationship Management Video Conferencing Settings Wireless Printing Managed Services Provider Professional Services Content Filtering Saving Time Virtual Machines Hacking IT Management Presentation VPN YouTube Meetings Managed IT Service Cryptocurrency Wireless Technology Downloads iPhone Computer Repair Licensing Virtual Desktop LiFi Vulnerabilities Entertainment Data storage Data Privacy Word Images 101 Outlook Machine Learning Telephone System Money Multi-Factor Authentication Mobility Humor Cost Management Content Remote Working Hacks Server Management Wearable Technology Memory Vendors Entrepreneur Scary Stories Private Cloud Fun Health IT Superfish Motherboard Data Breach Identity Theft Comparison Google Play Be Proactive Assessment Electronic Health Records Deep Learning Permissions Workforce Twitter Directions Videos Undo Wasting Time Threats Error Specifications Security Cameras Workplace Strategies Social Engineering Trend Micro Education Internet Exlporer Software as a Service Fraud Meta Remote Computing Microchip Username Mobile Computing Managing Costs Amazon Black Friday SSID Search eCommerce Tablet Database Surveillance Application Best Practice Virtual Assistant Outsource IT Alert Managed IT IT Technicians Virtual Machine Environment Buisness File Sharing Media Dark Data IT solutions Cyber Monday Medical IT How To Proxy Server Reviews IBM Legal Cookies Tactics Development Business Growth Hotspot Transportation Small Businesses Notifications Mirgation Hypervisor Displays Travel Google Maps PowerPoint Cortana Shopping Techology Nanotechnology Optimization Addiction Alt Codes Language Employer/Employee Relationships Outsourcing Management PCI DSS Competition Chatbots Downtime Unified Threat Management Navigation Hosted Solution Distributed Denial of Service Workplace Gig Economy Unified Threat Management Screen Reader Service Level Agreement Internet Service Provider Typing Computing Infrastructure Teamwork Hiring/Firing Network Congestion Regulations Compliance Identity Evernote Paperless User Co-managed IT Knowledge Bookmark Google Drive User Error Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care 5G Financial Data History Point of Sale Business Communications Unified Communications Break Fix Scams Experience Browsers Smartwatch IP Address Google Docs Connectivity IT Upload Procurement Bitcoin Network Management Azure Hybrid Work Running Cable Tech Support Monitors Social Network Telework Google Wallet Cyber security Multi-Factor Security Tech Human Resources Recovery Dark Web Cables CES IoT Communitications Trends Supply Chain Management Hard Drives Windows 8 Laptop Websites Customer Resource management FinTech Domains Drones Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Electronic Medical Records Data Analysis SharePoint Star Wars IT Assessment Gamification Flexibility Refrigeration Staff Value Business Intelligence Halloween Writing Organization Public Speaking Lenovo Social Networking Legislation Shortcuts Ransmoware Virtual Reality Fileless Malware Digital Security Cameras Lithium-ion battery Smart Devices

Blog Archive