Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Information Miscellaneous Training Covid-19 Gadgets Cloud Computing Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Blockchain Bandwidth Virtualization Wi-Fi Mobile Office Two-factor Authentication Vendor Apps Data Security Mobile Device Management Gmail Chrome Tip of the week Budget WiFi Apple Networking Employer-Employee Relationship App BYOD Managed Services Voice over Internet Protocol Marketing Office 365 Access Control HIPAA Applications How To BDR Hacker Computing Conferencing Avoiding Downtime Information Technology Website Healthcare Virtual Private Network Health Analytics Office Tips 2FA Augmented Reality Storage Password Retail Router Big Data Bring Your Own Device Managed IT Services Help Desk Operating System Computers Risk Management Display Printer Windows 11 Cooperation Paperless Office Infrastructure Firewall Free Resource Project Management Windows 7 Excel Document Management Microsoft 365 The Internet of Things Solutions Social Scam Data loss Monitoring Going Green Patch Management Customer Service Save Money Remote Monitoring Cybercrime Vulnerability End of Support Vendor Management Physical Security Telephone Remote Workers Licensing Computer Repair iPhone Virtual Desktop Data storage Word Entertainment LiFi Vulnerabilities Outlook Supply Chain Money Telephone System Images 101 Humor Machine Learning Cost Management Mobility Safety Multi-Factor Authentication Sports Mouse Maintenance Antivirus Employees User Tip Integration Administration Modem Mobile Security Processor Data Privacy Customer Relationship Management Holidays Smart Technology Data Storage Robot Settings Printing Wireless Hacking Presentation Video Conferencing Saving Time Content Filtering Managed Services Provider Professional Services YouTube Virtual Machines IT Management Wireless Technology Managed IT Service VPN Meetings Cryptocurrency Downloads Net Neutrality Google Docs Browsers SQL Server Unified Communications Amazon Connectivity Experience Break Fix Running Cable Financial Data Point of Sale Recovery History Bitcoin Upload IT Google Wallet Social Network Outsource IT Multi-Factor Security Smartwatch Hard Drives Network Management Domains Procurement Tech Support Azure Environment IoT Media Dark Web Trends Tech Laptop Telework Cyber security Windows 8 Monitors Communitications Drones Customer Resource management Small Businesses Regulations Google Calendar CES Refrigeration Microsoft Excel Public Speaking Supply Chain Management Websites Data Analysis Displays Star Wars Gamification Term Halloween Staff Lithium-ion battery FinTech IT Assessment Electronic Medical Records Entrepreneur Outsourcing Social Networking SharePoint Legislation Flexibility Fileless Malware Value Content Scary Stories Workplace Wearable Technology Lenovo Organization Hacks Writing Undo Smart Devices Virtual Reality Health IT Hiring/Firing Motherboard Fun Comparison Digital Security Cameras Permissions Server Management Remote Working Private Cloud Directions Memory Deep Learning Assessment Paperless Google Play Co-managed IT Superfish Identity Theft Data Breach Electronic Health Records Twitter Education Technology Care Specifications Videos Fraud Error Microchip Wasting Time Internet Exlporer Business Communications Username Security Cameras Scams Application Trend Micro Mobile Computing Social Engineering Software as a Service Remote Computing Hybrid Work Search Black Friday IBM Managing Costs Best Practice Database Human Resources SSID Buisness Cables IT Technicians Tablet eCommerce Surveillance Legal Alert Proxy Server Virtual Assistant IT solutions Cookies Cyber Monday Google Apps Hotspot Managed IT File Sharing Virtual Machine Business Growth Dark Data Tactics How To Medical IT IT Maintenance Mirgation Reviews Competition Development Notifications Transportation Business Intelligence Nanotechnology Cortana Shortcuts Language Travel Hypervisor Alt Codes Addiction Management PowerPoint Downtime Ransmoware Chatbots Techology Shopping Google Maps Optimization Employer/Employee Relationships Hosted Solution Vendors Screen Reader Distributed Denial of Service Be Proactive Computing Infrastructure PCI DSS Unified Threat Management User Typing Service Level Agreement Navigation Workforce Identity Unified Threat Management Gig Economy Internet Service Provider Google Drive Bookmark Teamwork Threats Smart Tech Knowledge Workplace Strategies Alerts IP Address Regulations Compliance Network Congestion Download Evernote Memes Meta 5G User Error

Blog Archive