Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Saving Money AI Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Windows 10 Blockchain Virtualization Wi-Fi Business Technology Bandwidth Managed Services Vendor Data Security Apps Two-factor Authentication Mobile Office Gmail Voice over Internet Protocol Apple Networking WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Password Managed IT Services How To HIPAA BDR Applications Computing Physical Security Information Technology Hacker Conferencing Access Control Avoiding Downtime Office 365 Marketing Storage Bring Your Own Device 2FA Healthcare Router Big Data Operating System Help Desk Virtual Private Network Risk Management Computers Health Office Tips Analytics Website Augmented Reality Retail Firewall Windows 11 Scam Remote Workers Data loss The Internet of Things Excel Going Green Patch Management Free Resource Social Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Cybercrime Microsoft 365 Monitoring Customer Service Solutions Display Printer Paperless Office Managed IT Service Infrastructure Telephone Document Management Cooperation Virtual Machines Professional Services Maintenance Antivirus Sports Mouse Telephone System Cost Management Safety Supply Chain Administration iPhone Vulnerabilities Robot User Tip Modem Settings Mobile Security Processor Images 101 Printing Wireless Mobility Content Filtering Multi-Factor Authentication IT Management Customer Relationship Management VPN YouTube Meetings Smart Technology Cryptocurrency Data Privacy Hacking Computer Repair Saving Time Employees Presentation Integration Virtual Desktop Data storage LiFi Wireless Technology Downloads Holidays Outlook Licensing Machine Learning Money Data Storage Word Humor Entertainment Video Conferencing Managed Services Provider Public Speaking Microsoft Excel Twitter Outsource IT Data Analysis Deep Learning Gig Economy Star Wars Media Gamification Lithium-ion battery Internet Service Provider Staff Error Teamwork Environment Entrepreneur Evernote Education Regulations Compliance Social Networking Legislation Social Engineering Memes Remote Computing Small Businesses Fileless Malware Mobile Computing Content Net Neutrality Wearable Technology SQL Server Displays Health IT Financial Data Motherboard Tablet Undo Search History Comparison IT Permissions Alert Outsourcing Directions Best Practice Smartwatch Assessment Managed IT Buisness Procurement File Sharing Azure Dark Data How To Tech Legal Workplace IT solutions Telework Cyber security Specifications Internet Exlporer Communitications Fraud Notifications Hiring/Firing Microchip Business Growth CES Paperless Username Supply Chain Management Travel Application Black Friday Term Co-managed IT Techology FinTech Google Maps Cortana Database IBM IT Assessment Technology Care Alt Codes Business Communications Downtime Flexibility IT Technicians Unified Threat Management Value Cyber Monday Scams Proxy Server Unified Threat Management Hosted Solution Organization Cookies Tactics Smart Devices Hotspot Hybrid Work Typing Digital Security Cameras Human Resources Remote Working Mirgation Memory Network Congestion Google Play Google Drive Cables User Error Nanotechnology Competition Knowledge Data Breach Videos Addiction Electronic Health Records Language Google Apps Management Chatbots Point of Sale 5G Wasting Time Experience Trend Micro Distributed Denial of Service Security Cameras Google Docs IT Maintenance Unified Communications Screen Reader Bitcoin Service Level Agreement Network Management Running Cable Software as a Service Computing Infrastructure Tech Support User Business Intelligence Google Wallet Shortcuts Identity Managing Costs Monitors eCommerce SSID Ransmoware Bookmark Smart Tech Windows 8 Download IP Address Laptop Surveillance Alerts Websites Virtual Assistant Vendors Drones Be Proactive Virtual Machine Break Fix Electronic Medical Records Medical IT Workforce Browsers SharePoint Reviews Connectivity Upload Halloween Development Recovery Transportation Threats Workplace Strategies Social Network Lenovo Hard Drives Hypervisor Multi-Factor Security Writing Optimization Dark Web Virtual Reality PowerPoint Meta Shopping IoT Domains Hacks Trends Server Management Scary Stories Private Cloud Employer/Employee Relationships Amazon Navigation Customer Resource management Superfish PCI DSS Regulations Identity Theft Refrigeration Fun Google Calendar

Blog Archive