Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Information Miscellaneous Artificial Intelligence Holiday Gadgets Covid-19 Cloud Computing Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Business Technology Windows 10 Blockchain Virtualization Wi-Fi Bandwidth Vendor Apps Data Security Two-factor Authentication Mobile Office Apple Gmail Tip of the week Managed Services Voice over Internet Protocol App WiFi Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management HIPAA Computing Applications How To Information Technology BDR Hacker Office 365 Avoiding Downtime Conferencing Marketing Access Control Healthcare Retail Big Data Operating System Router Managed IT Services Risk Management Help Desk Computers Analytics Office Tips 2FA Augmented Reality Physical Security Website Virtual Private Network Storage Password Health Bring Your Own Device Firewall Cooperation Document Management Remote Workers The Internet of Things Going Green Scam Social Data loss Cybercrime Free Resource Project Management Windows 7 Microsoft 365 Customer Service Patch Management Monitoring Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Windows 11 Excel Telephone Display Printer Paperless Office Infrastructure Video Conferencing Managed Services Provider Administration Virtual Machines Professional Services Machine Learning Safety Telephone System Cost Management Data Privacy Maintenance iPhone Settings Antivirus Wireless Printing Content Filtering Vulnerabilities YouTube User Tip Modem Images 101 Mobile Security Cryptocurrency Processor Customer Relationship Management Multi-Factor Authentication Mobility Virtual Desktop Robot Smart Technology Data storage LiFi Hacking Presentation Outlook Saving Time Employees IT Management Integration Wireless Technology Money VPN Meetings Managed IT Service Humor Supply Chain Downloads Computer Repair Holidays Sports Word Licensing Mouse Data Storage Entertainment Trends Websites Employer/Employee Relationships Mobile Computing Public Speaking Technology Care Google Calendar Lithium-ion battery Navigation Business Communications Customer Resource management Search Regulations PCI DSS Star Wars Gig Economy Electronic Medical Records Microsoft Excel Best Practice SharePoint Scams Data Analysis Entrepreneur Hybrid Work Buisness Gamification Staff Internet Service Provider Teamwork Legislation Legal Evernote IT solutions Lenovo Human Resources Social Networking Regulations Compliance Writing Virtual Reality Memes Business Growth Undo Cables Fileless Malware Server Management Content Private Cloud Wearable Technology Net Neutrality SQL Server Comparison History Superfish Google Apps Health IT Cortana Identity Theft Motherboard Financial Data Assessment Smartwatch Twitter Permissions IT Alt Codes IT Maintenance Directions Business Intelligence Downtime Error Procurement Azure Social Engineering Specifications Cyber security Tech Hosted Solution Application Shortcuts Telework Internet Exlporer CES Remote Computing Fraud Communitications Typing Ransmoware Microchip IBM Vendors Username Supply Chain Management Black Friday Google Drive Term Be Proactive Knowledge Tablet FinTech Database Alert IT Assessment Workforce Threats Managed IT 5G File Sharing IT Technicians Flexibility Dark Data Value How To Cyber Monday Google Docs Unified Communications Workplace Strategies Proxy Server Experience Cookies Organization Running Cable Tactics Digital Security Cameras Notifications Hotspot Smart Devices Bitcoin Competition Meta Google Wallet Amazon Travel Mirgation Remote Working Memory Data Breach Google Play Techology Google Maps Nanotechnology Laptop Addiction Videos Language Electronic Health Records Windows 8 Outsource IT Drones Environment User Media Management Unified Threat Management Chatbots Wasting Time Distributed Denial of Service Trend Micro Security Cameras Unified Threat Management Screen Reader Halloween Service Level Agreement Computing Infrastructure Software as a Service Small Businesses IP Address Displays Identity Network Congestion Managing Costs eCommerce SSID User Error Bookmark Smart Tech Scary Stories Download Alerts Surveillance Virtual Assistant Hacks Outsourcing Virtual Machine Recovery Fun Point of Sale Reviews Break Fix Medical IT Deep Learning Hard Drives Workplace Browsers Connectivity Network Management Upload Tech Support Development Transportation Domains Hiring/Firing Hypervisor Education Paperless Social Network Monitors Multi-Factor Security IoT Shopping Dark Web Optimization PowerPoint Refrigeration Co-managed IT

Blog Archive