Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication AI Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Compliance Gadgets Cloud Computing Covid-19 Training Managed Service Provider Remote Work Server IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Tip of the week Mobile Device Management Managed Services Chrome Voice over Internet Protocol Gmail Budget Networking WiFi Apple App Employer-Employee Relationship BYOD Office 365 Conferencing How To BDR HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Analytics Office Tips Augmented Reality Retail Healthcare Storage 2FA Password Bring Your Own Device Managed IT Services Big Data Operating System Router Physical Security Computers Virtual Private Network Risk Management Health Website Help Desk Document Management Firewall Remote Workers Windows 11 Telephone Scam Data loss The Internet of Things Excel Cooperation Free Resource Project Management Windows 7 Social Patch Management Save Money Microsoft 365 Remote Monitoring Going Green Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Display Printer Paperless Office Infrastructure Monitoring Video Conferencing Machine Learning Managed Services Provider Word Saving Time Outlook Virtual Machines Professional Services Money Humor Managed IT Service Maintenance Downloads Antivirus Safety iPhone Sports Supply Chain Licensing Mouse Entertainment Vulnerabilities Administration Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Customer Relationship Management Settings Wireless IT Management Printing VPN Employees Data Privacy Meetings Content Filtering Hacking Integration YouTube Presentation User Tip Modem Processor Cryptocurrency Computer Repair Mobile Security Wireless Technology Holidays Virtual Desktop Data Storage Data storage LiFi Smart Technology SharePoint Addiction Hard Drives Windows 8 Workplace Strategies Electronic Medical Records Language Employer/Employee Relationships Laptop Drones Meta Chatbots Navigation Management PCI DSS Domains Lenovo Gig Economy Amazon Screen Reader Writing Distributed Denial of Service Halloween Service Level Agreement Internet Service Provider Refrigeration Virtual Reality Computing Infrastructure Teamwork Public Speaking Outsource IT Private Cloud Identity Evernote Server Management Regulations Compliance Superfish Bookmark Lithium-ion battery Environment Identity Theft Smart Tech Memes Media Entrepreneur Scary Stories Download Net Neutrality Hacks Twitter Alerts SQL Server Small Businesses Error History Fun Financial Data Browsers Smartwatch Displays Connectivity IT Deep Learning Social Engineering Break Fix Upload Procurement Undo Remote Computing Azure Social Network Telework Outsourcing Cyber security Education Multi-Factor Security Tech CES Tablet IoT Communitications Dark Web Alert Trends Supply Chain Management Mobile Computing Workplace Managed IT Customer Resource management FinTech Hiring/Firing File Sharing Regulations Dark Data Google Calendar Term Search Data Analysis Star Wars IT Assessment Application Best Practice Paperless How To Microsoft Excel Co-managed IT Notifications Staff Value Buisness Gamification Flexibility Organization IBM Legal Technology Care Travel Social Networking IT solutions Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Business Growth Business Communications Scams Wearable Technology Memory Content Remote Working Health IT Hybrid Work Unified Threat Management Motherboard Data Breach Comparison Google Play Cortana Unified Threat Management Directions Videos Assessment Electronic Health Records Alt Codes Human Resources Permissions Cables Wasting Time Downtime Competition Trend Micro Hosted Solution Network Congestion Specifications Security Cameras User Error Microchip Internet Exlporer Software as a Service Typing Google Apps Fraud IT Maintenance Managing Costs Username Google Drive Business Intelligence Point of Sale eCommerce User Black Friday SSID Knowledge Database Surveillance Shortcuts Virtual Assistant Ransmoware Tech Support IT Technicians Virtual Machine 5G Network Management Proxy Server Reviews IP Address Google Docs Vendors Cookies Unified Communications Monitors Cyber Monday Medical IT Experience Tactics Development Bitcoin Be Proactive Hotspot Transportation Running Cable Workforce Websites Mirgation Hypervisor Google Wallet Shopping Threats Nanotechnology Optimization Recovery PowerPoint

Blog Archive