Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Computer Google Email Workplace Tips Phishing Hosted Solutions Workplace Strategy Collaboration Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Holiday Automation Information Facebook Miscellaneous Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Bandwidth Business Technology Blockchain Windows 10 Wi-Fi Virtualization Apps Mobile Office Vendor Data Security Two-factor Authentication Employer-Employee Relationship BYOD Chrome Budget Apple Tip of the week App Mobile Device Management Gmail Networking WiFi Managed Services Voice over Internet Protocol Office 365 Conferencing Hacker Access Control Avoiding Downtime Marketing HIPAA Applications Computing How To Information Technology BDR Healthcare Office Tips Analytics Augmented Reality Virtual Private Network Computers Storage Password 2FA Health Bring Your Own Device Website Retail Router Operating System Managed IT Services Risk Management Help Desk Big Data Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Telephone Customer Service Free Resource Project Management Display Printer Windows 11 Windows 7 Cooperation Paperless Office Microsoft 365 Infrastructure Excel Solutions Document Management Going Green Firewall Scam Data loss Cybercrime The Internet of Things Monitoring Patch Management Social Save Money Remote Workers Saving Time Outlook iPhone Managed IT Service Customer Relationship Management IT Management Money VPN Meetings Humor Downloads Vulnerabilities Licensing Hacking Computer Repair Images 101 Presentation Sports Entertainment Mouse Multi-Factor Authentication Mobility Supply Chain Wireless Technology Administration Telephone System Machine Learning Cost Management Employees Word Integration Settings Maintenance Printing Antivirus Wireless Holidays Content Filtering User Tip Modem Data Storage Data Privacy Mobile Security Safety YouTube Processor Video Conferencing Cryptocurrency Managed Services Provider Virtual Machines Professional Services Smart Technology Virtual Desktop Robot Data storage LiFi Windows 8 SQL Server Laptop Screen Reader Net Neutrality Workforce Distributed Denial of Service IBM Service Level Agreement Financial Data Threats Computing Infrastructure Drones History Unified Threat Management Smartwatch Identity IT Unified Threat Management Workplace Strategies Azure Halloween Bookmark Smart Tech Procurement Meta Download Telework Amazon Alerts Cyber security Tech Network Congestion CES Communitications User Error Competition Break Fix Hacks Scary Stories Browsers Connectivity Supply Chain Management Outsource IT Upload FinTech Environment Media Term Point of Sale Fun Social Network IT Assessment Multi-Factor Security Deep Learning Dark Web Value Network Management User Tech Support IoT Flexibility Small Businesses Trends Organization Displays Education Monitors Customer Resource management Digital Security Cameras Regulations Smart Devices Google Calendar Microsoft Excel IP Address Mobile Computing Memory Websites Data Analysis Star Wars Remote Working Outsourcing Gamification Staff Data Breach Google Play Search Electronic Medical Records Videos Social Networking Electronic Health Records SharePoint Workplace Legislation Best Practice Wasting Time Recovery Buisness Fileless Malware Hiring/Firing Content Wearable Technology Legal Trend Micro Lenovo Paperless Hard Drives IT solutions Security Cameras Writing Virtual Reality Health IT Motherboard Software as a Service Co-managed IT Comparison Domains Business Growth Technology Care Permissions Managing Costs Server Management Private Cloud Directions Assessment eCommerce Superfish Business Communications Refrigeration SSID Identity Theft Cortana Twitter Surveillance Scams Specifications Public Speaking Alt Codes Virtual Assistant Hybrid Work Fraud Lithium-ion battery Virtual Machine Downtime Error Microchip Internet Exlporer Username Reviews Human Resources Hosted Solution Medical IT Entrepreneur Social Engineering Remote Computing Development Cables Black Friday Typing Transportation Hypervisor Database Shopping IT Technicians Google Drive Optimization Google Apps Undo PowerPoint Tablet Knowledge Employer/Employee Relationships Alert Proxy Server Cookies IT Maintenance Cyber Monday PCI DSS Business Intelligence Hotspot Managed IT Navigation File Sharing 5G Dark Data Tactics How To Gig Economy Mirgation Google Docs Shortcuts Unified Communications Experience Bitcoin Teamwork Running Cable Notifications Nanotechnology Internet Service Provider Ransmoware Regulations Compliance Vendors Language Google Wallet Application Evernote Travel Addiction Management Chatbots Memes Techology Be Proactive Google Maps

Blog Archive