Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade Smartphones VoIP AI Business Management communications Mobile Devices Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Information Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Employee/Employer Relationship IT Support Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Blockchain Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship BYOD Chrome Managed Services Voice over Internet Protocol Budget Tip of the week Mobile Device Management Apple Gmail App Networking Computing Information Technology Conferencing Hacker Office 365 Access Control Avoiding Downtime Marketing HIPAA Applications How To WiFi BDR Operating System Help Desk Risk Management Virtual Private Network Computers 2FA Analytics Office Tips Health Augmented Reality Website Healthcare Storage Password Retail Bring Your Own Device Router Managed IT Services Big Data Monitoring Patch Management Social Save Money Cybercrime Remote Monitoring End of Support Vulnerability Vendor Management Physical Security Customer Service Windows 11 Telephone Display Printer Paperless Office Infrastructure Excel Cooperation Remote Workers Document Management Firewall Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Going Green Solutions Robot Content Filtering Employees Integration Smart Technology YouTube Saving Time Cryptocurrency Customer Relationship Management IT Management Meetings VPN Holidays Managed IT Service Virtual Desktop Data Storage Data storage LiFi Hacking Downloads Video Conferencing Computer Repair Presentation Licensing Managed Services Provider Supply Chain Professional Services Outlook Virtual Machines Entertainment Wireless Technology Money Humor Machine Learning iPhone Telephone System Sports Word Cost Management Mouse Vulnerabilities Maintenance Administration Antivirus Data Privacy Images 101 Mobility Safety Multi-Factor Authentication User Tip Modem Mobile Security Processor Settings Wireless Printing Travel Security Cameras Workforce Hosted Solution Mirgation Application Trend Micro Techology Software as a Service Google Maps Threats Typing Nanotechnology IBM Language Managing Costs Workplace Strategies Addiction Unified Threat Management SSID Google Drive Meta Management Chatbots Knowledge eCommerce Unified Threat Management Surveillance Virtual Assistant Amazon Screen Reader Distributed Denial of Service Service Level Agreement Computing Infrastructure 5G Virtual Machine Medical IT Google Docs Outsource IT Network Congestion Unified Communications Identity Experience Reviews User Error Development Transportation Environment Bookmark Bitcoin Media Smart Tech Running Cable Competition Download Alerts Hypervisor Google Wallet Point of Sale PowerPoint Small Businesses Shopping Optimization Break Fix Employer/Employee Relationships Displays Browsers Windows 8 Connectivity Laptop Upload User PCI DSS Network Management Tech Support Navigation Drones Outsourcing Social Network Monitors Gig Economy Multi-Factor Security Dark Web Internet Service Provider Teamwork IoT Halloween Workplace Trends IP Address Regulations Compliance Websites Evernote Memes Hiring/Firing Customer Resource management Regulations Google Calendar Microsoft Excel SharePoint Net Neutrality SQL Server Data Analysis Electronic Medical Records Hacks Paperless Star Wars Scary Stories Co-managed IT Gamification Staff Fun Recovery Financial Data History IT Technology Care Writing Deep Learning Social Networking Hard Drives Smartwatch Legislation Lenovo Domains Procurement Azure Fileless Malware Virtual Reality Business Communications Tech Scams Content Education Wearable Technology Telework Server Management Cyber security Private Cloud Communitications Identity Theft Hybrid Work Health IT Motherboard Refrigeration CES Comparison Superfish Public Speaking Permissions Supply Chain Management Directions Twitter Mobile Computing Human Resources Assessment Term Cables Lithium-ion battery Search FinTech Error Entrepreneur IT Assessment Social Engineering Best Practice Specifications Buisness Fraud Flexibility Value Microchip Remote Computing Google Apps Internet Exlporer Legal IT Maintenance Username IT solutions Organization Smart Devices Tablet Business Intelligence Business Growth Undo Digital Security Cameras Black Friday Remote Working Memory Alert Shortcuts Database Google Play Ransmoware Dark Data IT Technicians Cortana Managed IT Data Breach File Sharing Electronic Health Records Vendors Proxy Server How To Alt Codes Cookies Videos Cyber Monday Downtime Hotspot Wasting Time Notifications Be Proactive Tactics

Blog Archive