Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Data Recovery Upgrade Disaster Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Information Miscellaneous Training Covid-19 Gadgets Cloud Computing Server Compliance Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Blockchain Bandwidth Virtualization Mobile Office Two-factor Authentication Vendor Apps Data Security Mobile Device Management Gmail Tip of the week Chrome Budget WiFi Apple Networking Employer-Employee Relationship App Managed Services BYOD Voice over Internet Protocol Computing Avoiding Downtime Information Technology Marketing Access Control Office 365 HIPAA Applications How To BDR Hacker Conferencing Healthcare Website Virtual Private Network Risk Management Health Analytics Office Tips Augmented Reality Retail Storage Router Big Data Password Bring Your Own Device Managed IT Services 2FA Help Desk Computers Operating System Telephone Physical Security Display Printer Paperless Office Cooperation Free Resource Infrastructure Project Management Firewall Windows 7 Microsoft 365 Document Management Solutions The Internet of Things Scam Social Data loss Windows 11 Monitoring Going Green Patch Management Customer Service Save Money Excel Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Remote Workers VPN YouTube Meetings Downloads iPhone Cryptocurrency Licensing Computer Repair Word Vulnerabilities Entertainment Virtual Desktop Data Privacy Data storage LiFi Images 101 Mobility Outlook Telephone System Multi-Factor Authentication Cost Management Machine Learning Safety Money Humor Employees Maintenance Sports Integration Antivirus Mouse User Tip Modem Mobile Security Processor Administration Holidays Customer Relationship Management Data Storage Smart Technology Supply Chain Video Conferencing Robot Hacking Managed Services Provider Settings Professional Services Saving Time Presentation Virtual Machines Printing Wireless Content Filtering Managed IT Service Wireless Technology IT Management IP Address Download Net Neutrality Alerts SQL Server Technology Care Network Congestion Google Drive User Error Financial Data History Knowledge Business Communications Connectivity IT Break Fix Scams Browsers Smartwatch Upload Procurement Recovery Point of Sale Azure Hybrid Work 5G Multi-Factor Security Tech Human Resources Google Docs Social Network Telework Hard Drives Unified Communications Cyber security Experience IoT Communitications Running Cable Tech Support Dark Web Cables CES Domains Bitcoin Network Management Google Wallet Trends Supply Chain Management Monitors Google Calendar Term Google Apps Customer Resource management FinTech Refrigeration Regulations Star Wars IT Assessment Laptop Websites Microsoft Excel IT Maintenance Data Analysis Public Speaking Windows 8 Lithium-ion battery Drones Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts SharePoint Organization Social Networking Entrepreneur Electronic Medical Records Smart Devices Halloween Ransmoware Fileless Malware Digital Security Cameras Lenovo Content Remote Working Wearable Technology Memory Vendors Writing Comparison Google Play Be Proactive Health IT Undo Motherboard Data Breach Virtual Reality Assessment Electronic Health Records Scary Stories Private Cloud Permissions Workforce Directions Videos Hacks Server Management Superfish Identity Theft Wasting Time Threats Fun Specifications Security Cameras Workplace Strategies Deep Learning Trend Micro Twitter Internet Exlporer Software as a Service Error Fraud Meta Microchip Username Application Education Managing Costs Amazon Social Engineering Black Friday SSID eCommerce Remote Computing Mobile Computing Database Surveillance Virtual Assistant Outsource IT IBM Tablet IT Technicians Virtual Machine Environment Search Media Alert Cyber Monday Medical IT Proxy Server Reviews Best Practice Cookies Managed IT Tactics Development Buisness File Sharing Hotspot Transportation Small Businesses Dark Data Legal IT solutions Mirgation Hypervisor Displays How To Notifications PowerPoint Shopping Competition Business Growth Nanotechnology Optimization Addiction Travel Language Employer/Employee Relationships Outsourcing Techology Management PCI DSS Google Maps Chatbots Cortana Navigation Distributed Denial of Service Workplace Gig Economy Alt Codes Screen Reader Service Level Agreement Internet Service Provider User Downtime Unified Threat Management Computing Infrastructure Teamwork Hiring/Firing Unified Threat Management Regulations Compliance Hosted Solution Identity Evernote Paperless Co-managed IT Bookmark Typing Smart Tech Memes

Blog Archive