Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Productivity Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Automation Facebook Information Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Blockchain Virtualization Wi-Fi Mobile Office Data Security Vendor Apps Two-factor Authentication Chrome Budget Tip of the week Mobile Device Management Apple Gmail App Networking Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Avoiding Downtime Conferencing Access Control Marketing WiFi How To HIPAA BDR Computing Applications Information Technology Hacker Office 365 Augmented Reality Health Website Storage Password Bring Your Own Device Retail Managed IT Services Big Data Router Operating System Risk Management 2FA Help Desk Computers Virtual Private Network Office Tips Analytics Healthcare Paperless Office Infrastructure Telephone Free Resource Project Management Document Management Windows 7 Firewall Cooperation Microsoft 365 Solutions Scam Data loss The Internet of Things Going Green Social Cybercrime Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Customer Service Monitoring Physical Security Excel Remote Workers Display Printer Money iPhone Managed IT Service Humor Downloads Vulnerabilities Word Sports Licensing Machine Learning Images 101 Mouse Entertainment Multi-Factor Authentication Mobility Data Privacy Administration Maintenance Antivirus Safety Telephone System Cost Management Employees Integration Settings Printing Wireless Content Filtering Robot Holidays YouTube Modem User Tip Processor Mobile Security Data Storage Cryptocurrency Customer Relationship Management Video Conferencing Managed Services Provider IT Management Meetings Virtual Machines Virtual Desktop Professional Services VPN Supply Chain Smart Technology Data storage Hacking LiFi Presentation Outlook Computer Repair Saving Time Wireless Technology Paperless IP Address Smartwatch Monitors IT Identity Bookmark Azure Smart Tech Co-managed IT Procurement Telework Hacks Cyber security Scary Stories Download Tech Technology Care Alerts Websites Business Communications CES Recovery Communitications Fun Browsers SharePoint Connectivity Scams Break Fix Electronic Medical Records Hard Drives Supply Chain Management Deep Learning FinTech Upload Term Hybrid Work Domains Human Resources Multi-Factor Security Writing IT Assessment Education Social Network Lenovo Value IoT Cables Dark Web Virtual Reality Refrigeration Flexibility Organization Mobile Computing Trends Server Management Private Cloud Public Speaking Regulations Identity Theft Google Apps Lithium-ion battery Google Calendar Digital Security Cameras Smart Devices Customer Resource management Search Superfish Data Analysis Memory Star Wars IT Maintenance Microsoft Excel Twitter Remote Working Best Practice Entrepreneur Data Breach Buisness Gamification Google Play Business Intelligence Staff Error Social Networking Shortcuts Legislation Videos Legal Social Engineering Electronic Health Records IT solutions Fileless Malware Wasting Time Ransmoware Remote Computing Undo Business Growth Trend Micro Content Security Cameras Vendors Wearable Technology Motherboard Tablet Be Proactive Comparison Software as a Service Health IT Cortana Directions Managing Costs Assessment Workforce Permissions Alert Alt Codes File Sharing Dark Data eCommerce Downtime SSID Managed IT Threats Workplace Strategies Specifications How To Application Surveillance Hosted Solution Virtual Assistant Microchip Virtual Machine Internet Exlporer Meta Fraud Notifications Typing Travel IBM Reviews Username Medical IT Amazon Techology Google Maps Black Friday Google Drive Development Transportation Knowledge Hypervisor Database Outsource IT Unified Threat Management Media Shopping Optimization PowerPoint 5G Environment IT Technicians Unified Threat Management Cookies Cyber Monday Google Docs Unified Communications Proxy Server Employer/Employee Relationships Experience Bitcoin Running Cable Tactics Navigation Small Businesses Hotspot Competition PCI DSS Gig Economy Google Wallet Network Congestion Displays Mirgation User Error Nanotechnology Internet Service Provider Teamwork Windows 8 Laptop Addiction Evernote Outsourcing Language Regulations Compliance Point of Sale Drones User Memes Management Chatbots Screen Reader Workplace Distributed Denial of Service Net Neutrality SQL Server Financial Data History Halloween Service Level Agreement Network Management Hiring/Firing Computing Infrastructure Tech Support

Blog Archive