Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android AI Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Covid-19 Training Gadgets Cloud Computing Server Remote Work Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Computing Hacker HIPAA Information Technology Avoiding Downtime Applications Access Control Marketing Office 365 Conferencing WiFi How To BDR Computers Risk Management Virtual Private Network Router Website Health Analytics Office Tips Augmented Reality 2FA Help Desk Retail Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Physical Security Solutions Display Printer Paperless Office Infrastructure Windows 11 Firewall Document Management Monitoring Excel The Internet of Things Scam Data loss Remote Workers Telephone Social Free Resource Cooperation Going Green Patch Management Save Money Project Management Windows 7 Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Microsoft 365 Cybercrime Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology Computer Repair Employees Integration Virtual Desktop Data storage LiFi User Tip Modem Mobile Security Processor Word Outlook Holidays Machine Learning Data Storage Money Humor Supply Chain Smart Technology Video Conferencing Managed Services Provider Safety Professional Services Maintenance Saving Time Virtual Machines Antivirus Sports Mouse Managed IT Service Administration Downloads iPhone Licensing Vulnerabilities Entertainment Robot Data Privacy Customer Relationship Management Settings Images 101 Wireless Printing Content Filtering Telephone System Multi-Factor Authentication Mobility Cost Management Hacking IT Management Network Congestion Remote Working Content Memory Vendors Wearable Technology Google Drive User Error Google Play Be Proactive Comparison User Knowledge Health IT Data Breach Motherboard Electronic Health Records Assessment Workforce Permissions Videos Directions Point of Sale 5G Wasting Time Threats IP Address Google Docs Security Cameras Workplace Strategies Specifications Unified Communications Experience Trend Micro Software as a Service Internet Exlporer Meta Fraud Bitcoin Network Management Running Cable Tech Support Microchip Monitors Username Managing Costs Amazon Google Wallet SSID Black Friday Recovery eCommerce Surveillance Database Virtual Assistant Outsource IT Hard Drives Windows 8 Laptop Websites Virtual Machine Environment IT Technicians Domains Drones Media SharePoint Medical IT Cyber Monday Electronic Medical Records Reviews Proxy Server Cookies Development Tactics Transportation Small Businesses Hotspot Refrigeration Halloween Writing Hypervisor Displays Mirgation Public Speaking Lenovo Lithium-ion battery PowerPoint Virtual Reality Shopping Optimization Nanotechnology Addiction Employer/Employee Relationships Outsourcing Language Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Theft Fun PCI DSS Management Chatbots Superfish Navigation Workplace Distributed Denial of Service Deep Learning Twitter Gig Economy Screen Reader Internet Service Provider Service Level Agreement Teamwork Hiring/Firing Computing Infrastructure Undo Error Education Social Engineering Regulations Compliance Identity Paperless Evernote Co-managed IT Remote Computing Bookmark Memes Smart Tech Net Neutrality Download SQL Server Technology Care Alerts Mobile Computing Tablet Search Financial Data History Business Communications Scams Break Fix Application Best Practice Alert Smartwatch Browsers IT Connectivity Dark Data Procurement Upload Azure Hybrid Work Managed IT Buisness File Sharing IT solutions How To Telework Social Network Cyber security IBM Legal Human Resources Multi-Factor Security Tech Cables Dark Web Business Growth Notifications CES Communitications IoT Supply Chain Management Trends Travel Google Maps Cortana FinTech Customer Resource management Regulations Techology Google Apps Google Calendar Term IT Maintenance Microsoft Excel Alt Codes Data Analysis IT Assessment Star Wars Flexibility Gamification Value Business Intelligence Staff Competition Downtime Unified Threat Management Hosted Solution Organization Social Networking Unified Threat Management Shortcuts Legislation Smart Devices Ransmoware Typing Digital Security Cameras Fileless Malware

Blog Archive