Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android AI Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Holiday Miscellaneous Automation Artificial Intelligence Information Training Gadgets Covid-19 Cloud Computing Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Blockchain Bandwidth Windows 10 Wi-Fi Two-factor Authentication Apps Vendor Mobile Office Data Security WiFi Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Mobile Device Management Gmail BYOD Managed Services Voice over Internet Protocol Information Technology Access Control Office 365 HIPAA Hacker Applications Avoiding Downtime How To Marketing BDR Computing Conferencing Healthcare Virtual Private Network Risk Management Big Data Health Analytics Office Tips Augmented Reality Retail Storage Computers Password Router Bring Your Own Device Managed IT Services Website 2FA Help Desk Operating System The Internet of Things Display Telephone Printer Social Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Customer Service Solutions Scam Data loss Windows 11 Going Green Patch Management Monitoring Save Money Firewall Remote Monitoring End of Support Excel Vulnerability Vendor Management Cybercrime Remote Workers Physical Security Cryptocurrency Downloads Computer Repair iPhone Licensing Virtual Desktop Data storage Entertainment LiFi Vulnerabilities Data Privacy Outlook Images 101 Customer Relationship Management Machine Learning Telephone System Multi-Factor Authentication Mobility Money Humor Cost Management Hacking Maintenance Presentation Antivirus Sports Employees Mouse Wireless Technology Integration User Tip Administration Modem Processor Mobile Security Holidays Word Robot Data Storage Smart Technology Supply Chain Video Conferencing Settings Managed Services Provider Wireless Printing Saving Time Virtual Machines Content Filtering Professional Services IT Management Safety VPN YouTube Meetings Managed IT Service Download Net Neutrality Alerts SQL Server Technology Care History 5G Business Communications Financial Data Point of Sale Browsers Smartwatch Unified Communications Connectivity IT Experience Break Fix Scams Google Docs Bitcoin Network Management Upload Procurement Running Cable Tech Support Azure Hybrid Work Cyber security Monitors Multi-Factor Security Tech Human Resources Application Google Wallet Social Network Telework CES IoT Communitications Dark Web Cables IBM Windows 8 Trends Supply Chain Management Laptop Websites Customer Resource management FinTech Regulations Google Calendar Term Google Apps Drones SharePoint Data Analysis Star Wars IT Assessment Electronic Medical Records Microsoft Excel IT Maintenance Staff Value Business Intelligence Gamification Flexibility Halloween Organization Social Networking Writing Legislation Shortcuts Lenovo Fileless Malware Digital Security Cameras Smart Devices Virtual Reality Ransmoware Competition Wearable Technology Memory Vendors Hacks Server Management Content Remote Working Scary Stories Private Cloud Health IT Identity Theft Motherboard Data Breach Fun Comparison Google Play Be Proactive Superfish Directions Videos Deep Learning Assessment Electronic Health Records Twitter Permissions Workforce Wasting Time Threats User Error Education Trend Micro Social Engineering Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Remote Computing Fraud Meta Managing Costs Amazon IP Address Mobile Computing Username Tablet eCommerce Search Black Friday SSID Best Practice Database Surveillance Alert Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Dark Data Media Recovery Managed IT Buisness File Sharing Proxy Server Reviews IT solutions Cookies How To Cyber Monday Medical IT Hard Drives Legal Domains Business Growth Tactics Development Notifications Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Travel Shopping Google Maps Nanotechnology Optimization Cortana PowerPoint Refrigeration Techology Public Speaking Alt Codes Addiction Language Employer/Employee Relationships Outsourcing Chatbots Lithium-ion battery Navigation Management PCI DSS Downtime Unified Threat Management Entrepreneur Gig Economy Hosted Solution Screen Reader Distributed Denial of Service Workplace Unified Threat Management Typing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Network Congestion Evernote Paperless Regulations Compliance Bookmark Smart Tech Memes Knowledge Co-managed IT Undo Google Drive User Error

Blog Archive