Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade AI Data Recovery Business Management Smartphones Disaster Recovery VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Miscellaneous Artificial Intelligence Automation Information Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Spam IT Support Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Virtualization Bandwidth Blockchain Business Technology Windows 10 Data Security Two-factor Authentication Apps Mobile Office Vendor Gmail Networking Employer-Employee Relationship BYOD Chrome Managed Services Voice over Internet Protocol Budget Apple Tip of the week Mobile Device Management App Applications Computing WiFi How To Information Technology BDR Conferencing Office 365 Hacker Avoiding Downtime Access Control Marketing HIPAA Operating System Managed IT Services Big Data Help Desk Risk Management 2FA Office Tips Analytics Augmented Reality Computers Healthcare Virtual Private Network Storage Password Bring Your Own Device Health Website Router Retail Solutions Scam Cybercrime Data loss The Internet of Things Monitoring Social Patch Management Windows 11 Save Money Remote Monitoring Vulnerability End of Support Vendor Management Excel Telephone Customer Service Physical Security Remote Workers Display Cooperation Printer Paperless Office Infrastructure Free Resource Project Management Windows 7 Document Management Microsoft 365 Going Green Firewall Settings Maintenance Antivirus Printing User Tip Modem Wireless Content Filtering Mobile Security Safety Processor Employees Integration YouTube Cryptocurrency Smart Technology Holidays Saving Time Robot Data Storage Virtual Desktop Data storage LiFi Video Conferencing Managed IT Service Supply Chain Customer Relationship Management Managed Services Provider Virtual Machines Professional Services Outlook Downloads IT Management VPN Meetings Money Hacking Licensing Humor Presentation Entertainment iPhone Computer Repair Wireless Technology Sports Mouse Vulnerabilities Telephone System Administration Cost Management Images 101 Data Privacy Machine Learning Word Multi-Factor Authentication Mobility Twitter Videos Alt Codes Username Electronic Health Records Entrepreneur Vendors Black Friday Error Be Proactive Downtime Wasting Time Database Trend Micro Security Cameras Workforce Social Engineering Hosted Solution Remote Computing Typing Undo Software as a Service IT Technicians Threats Cyber Monday Workplace Strategies Proxy Server Cookies Managing Costs Tactics eCommerce Knowledge Hotspot SSID Tablet Google Drive Meta Alert Surveillance Mirgation Virtual Assistant Amazon Managed IT File Sharing Dark Data Nanotechnology Virtual Machine 5G Application Addiction Experience Language Medical IT Google Docs Outsource IT How To Reviews Unified Communications Environment Notifications Bitcoin Media Management Development Running Cable Chatbots Transportation Distributed Denial of Service Travel Google Wallet IBM Screen Reader Hypervisor Service Level Agreement Optimization Computing Infrastructure PowerPoint Techology Google Maps Small Businesses Shopping Displays Windows 8 Laptop Identity Employer/Employee Relationships Navigation Unified Threat Management Drones Bookmark PCI DSS Smart Tech Download Alerts Unified Threat Management Outsourcing Gig Economy Competition Internet Service Provider Halloween Teamwork Break Fix Evernote Workplace Browsers Network Congestion Regulations Compliance Connectivity Upload Memes User Error Hiring/Firing Hacks Paperless Social Network Net Neutrality Scary Stories SQL Server Multi-Factor Security Fun Dark Web Point of Sale Co-managed IT Financial Data User IoT History Deep Learning Trends IT Technology Care Smartwatch Tech Support Business Communications Customer Resource management Procurement Regulations Azure Google Calendar Network Management Microsoft Excel Tech Scams IP Address Data Analysis Monitors Telework Education Star Wars Cyber security Gamification Communitications Staff Hybrid Work CES Websites Mobile Computing Human Resources Supply Chain Management Social Networking Legislation Search Term Cables Fileless Malware FinTech Recovery Best Practice Hard Drives Content IT Assessment Wearable Technology SharePoint Electronic Medical Records Google Apps Domains Health IT Flexibility Buisness Motherboard Value Comparison Permissions Lenovo Legal IT Maintenance Directions Writing Organization IT solutions Assessment Virtual Reality Digital Security Cameras Business Growth Refrigeration Smart Devices Business Intelligence Server Management Private Cloud Shortcuts Public Speaking Remote Working Memory Specifications Internet Exlporer Data Breach Cortana Fraud Google Play Superfish Identity Theft Ransmoware Lithium-ion battery Microchip

Blog Archive