Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft AI Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Compliance Covid-19 Gadgets Cloud Computing Training Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Managed Services Two-factor Authentication Mobile Office WiFi Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Managed IT Services How To BDR HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Password Bring Your Own Device Big Data Operating System Computers Router 2FA Risk Management Virtual Private Network Website Health Help Desk Healthcare Analytics Office Tips Augmented Reality Retail Storage The Internet of Things Scam Data loss Microsoft 365 Solutions Social Cooperation Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Windows 11 Vendor Management Cybercrime Excel Display Printer Paperless Office Remote Workers Infrastructure Monitoring Firewall Document Management Free Resource Project Management Managed IT Service Windows 7 Telephone Mouse Multi-Factor Authentication Mobility Licensing Entertainment Administration Employees Integration Robot Telephone System Customer Relationship Management Cost Management Settings Wireless Printing Holidays Content Filtering Hacking IT Management YouTube Meetings Data Storage Presentation VPN Supply Chain Video Conferencing Cryptocurrency Modem Wireless Technology User Tip Managed Services Provider Processor Virtual Machines Professional Services Computer Repair Mobile Security Virtual Desktop Data storage LiFi Word Smart Technology Outlook iPhone Machine Learning Money Saving Time Humor Vulnerabilities Data Privacy Images 101 Safety Maintenance Sports Downloads Antivirus Browsers Education Connectivity Shortcuts Social Engineering Break Fix Organization Digital Security Cameras Smart Devices Upload Ransmoware Remote Computing Multi-Factor Security Remote Working Mobile Computing Social Network Memory Vendors Data Breach Tablet IoT Google Play Be Proactive Search Dark Web Videos Electronic Health Records Application Best Practice Trends Workforce Alert Buisness File Sharing Regulations Dark Data Google Calendar Managed IT Customer Resource management Wasting Time Threats IBM Legal Data Analysis Trend Micro IT solutions Star Wars Security Cameras Workplace Strategies How To Microsoft Excel Software as a Service Business Growth Gamification Meta Notifications Staff Travel Social Networking Legislation Managing Costs Amazon Techology Fileless Malware eCommerce Google Maps SSID Cortana Surveillance Alt Codes Content Virtual Assistant Outsource IT Wearable Technology Downtime Unified Threat Management Motherboard Media Comparison Competition Health IT Virtual Machine Environment Unified Threat Management Directions Hosted Solution Assessment Medical IT Permissions Reviews Development Typing Transportation Small Businesses Network Congestion Specifications Hypervisor Displays Google Drive User Error Microchip Optimization User Internet Exlporer PowerPoint Knowledge Fraud Shopping Username Employer/Employee Relationships Outsourcing Point of Sale Navigation 5G Black Friday PCI DSS Gig Economy IP Address Google Docs Unified Communications Database Workplace Experience Internet Service Provider Bitcoin Network Management Teamwork Hiring/Firing Running Cable Tech Support IT Technicians Cookies Evernote Paperless Monitors Cyber Monday Regulations Compliance Google Wallet Proxy Server Memes Recovery Tactics Co-managed IT Hotspot Net Neutrality Hard Drives Windows 8 SQL Server Technology Care Laptop Websites Mirgation Drones History Nanotechnology Business Communications Financial Data Domains Smartwatch SharePoint IT Addiction Scams Electronic Medical Records Language Halloween Chatbots Procurement Refrigeration Management Azure Hybrid Work Public Speaking Lenovo Cyber security Screen Reader Tech Human Resources Writing Distributed Denial of Service Telework CES Lithium-ion battery Communitications Service Level Agreement Cables Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Supply Chain Management Hacks Server Management Superfish Bookmark Identity Theft Smart Tech Term Google Apps Fun FinTech IT Assessment Deep Learning Download IT Maintenance Twitter Alerts Error Flexibility Undo Value Business Intelligence

Blog Archive