Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Automation Facebook Miscellaneous Holiday Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Compliance Outsourced IT Remote Work Server Managed Service Provider IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Bandwidth Business Technology Blockchain Virtualization Wi-Fi Windows 10 Vendor Apps Data Security Managed Services Mobile Office Two-factor Authentication Budget WiFi Tip of the week Apple Employer-Employee Relationship App Networking Voice over Internet Protocol BYOD Mobile Device Management Chrome Gmail Password HIPAA Applications Managed IT Services How To BDR Hacker Computing Avoiding Downtime Information Technology Conferencing Marketing Physical Security Office 365 Access Control Storage Big Data Bring Your Own Device Retail Router Computers 2FA Operating System Help Desk Risk Management Website Healthcare Virtual Private Network Analytics Office Tips Augmented Reality Health Windows 7 The Internet of Things Microsoft 365 Document Management Solutions Social Scam Data loss Going Green Windows 11 Customer Service Monitoring Cybercrime Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Vendor Management Managed IT Service Remote Workers Telephone Display Printer Firewall Paperless Office Cooperation Free Resource Infrastructure Project Management Safety Images 101 Mobility Telephone System Multi-Factor Authentication Cost Management Machine Learning Sports Mouse Administration Maintenance Employees Integration Antivirus Customer Relationship Management User Tip Modem Mobile Security Processor Settings Holidays Wireless Hacking Printing Data Storage Content Filtering Presentation Smart Technology Supply Chain Video Conferencing Robot YouTube Managed Services Provider Wireless Technology Professional Services Cryptocurrency Saving Time Virtual Machines IT Management Meetings Virtual Desktop VPN Data storage Word LiFi Downloads iPhone Licensing Outlook Computer Repair Vulnerabilities Entertainment Data Privacy Money Humor Star Wars IT Assessment Microsoft Excel IT Maintenance Hacks Data Analysis Websites Scary Stories Gamification Flexibility Fun Staff Value Business Intelligence Undo Legislation Shortcuts SharePoint Deep Learning Organization Electronic Medical Records Social Networking Smart Devices Ransmoware Fileless Malware Digital Security Cameras Education Content Remote Working Writing Wearable Technology Memory Vendors Lenovo Comparison Google Play Be Proactive Health IT Virtual Reality Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Application Server Management Mobile Computing Directions Videos Private Cloud Identity Theft Search Wasting Time Threats Superfish Specifications Security Cameras Workplace Strategies IBM Best Practice Twitter Trend Micro Internet Exlporer Software as a Service Fraud Meta Microchip Error Buisness IT solutions Username Social Engineering Managing Costs Amazon Legal Black Friday SSID Business Growth Remote Computing eCommerce Database Surveillance Virtual Assistant Outsource IT Tablet Cortana IT Technicians Virtual Machine Environment Media Competition Cyber Monday Medical IT Alt Codes Proxy Server Reviews Alert Cookies Tactics Development Dark Data Hotspot Transportation Small Businesses Managed IT File Sharing Downtime Hosted Solution How To Mirgation Hypervisor Displays PowerPoint User Typing Shopping Notifications Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Travel Google Drive Google Maps Management PCI DSS Knowledge Chatbots Navigation Techology Distributed Denial of Service Workplace IP Address Gig Economy Screen Reader Service Level Agreement Internet Service Provider 5G Computing Infrastructure Teamwork Hiring/Firing Unified Threat Management Unified Threat Management Google Docs Unified Communications Regulations Compliance Experience Identity Evernote Paperless Co-managed IT Recovery Bitcoin Bookmark Running Cable Smart Tech Memes Download Net Neutrality Network Congestion Alerts SQL Server Technology Care Hard Drives Google Wallet User Error Financial Data History Business Communications Domains Break Fix Scams Windows 8 Browsers Smartwatch Laptop Connectivity IT Point of Sale Upload Procurement Azure Hybrid Work Refrigeration Drones Public Speaking Social Network Telework Cyber security Multi-Factor Security Tech Human Resources IoT Communitications Dark Web Cables Lithium-ion battery Network Management CES Tech Support Halloween Entrepreneur Trends Supply Chain Management Monitors Google Calendar Term Google Apps Customer Resource management FinTech Regulations

Blog Archive