Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Managed Service Android Upgrade AI Business Management Smartphones Data Recovery VoIP communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Facebook Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Training Gadgets Managed Service Provider Remote Work Server Outsourced IT Compliance Encryption Employee/Employer Relationship IT Support Spam Windows 10 Office Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps App Mobile Device Management BYOD Gmail Tip of the week Chrome Employer-Employee Relationship Budget Managed Services Voice over Internet Protocol Apple Networking BDR Marketing Computing HIPAA Information Technology Applications WiFi Access Control Office 365 Conferencing Hacker How To Avoiding Downtime Website Operating System Router Risk Management Virtual Private Network Big Data Health Analytics Office Tips 2FA Help Desk Augmented Reality Retail Storage Password Computers Bring Your Own Device Healthcare Managed IT Services Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Firewall Vendor Management Cybercrime Solutions Physical Security Display Printer The Internet of Things Paperless Office Infrastructure Windows 11 Social Monitoring Document Management Excel Customer Service Remote Workers Scam Telephone Data loss Data Privacy Robot Images 101 Word Telephone System Multi-Factor Authentication Settings Mobility Cost Management Wireless Printing Content Filtering IT Management YouTube Meetings VPN Safety Employees Cryptocurrency Integration Computer Repair User Tip Modem Virtual Desktop Mobile Security Processor Data storage LiFi Holidays Outlook Data Storage Smart Technology Supply Chain Machine Learning Video Conferencing Money Humor Customer Relationship Management Managed Services Provider Professional Services Saving Time Virtual Machines Maintenance Managed IT Service Antivirus Hacking Sports Mouse Presentation Downloads iPhone Wireless Technology Administration Licensing Vulnerabilities Entertainment Legal Trends Supply Chain Management IT solutions How To Customer Resource management FinTech Business Growth Recovery Regulations Notifications Google Calendar Term Google Apps Travel Microsoft Excel IT Maintenance Data Analysis Hard Drives Star Wars IT Assessment Techology Domains Gamification Flexibility Google Maps Staff Value Business Intelligence Cortana Organization Alt Codes Social Networking Legislation Shortcuts Smart Devices Downtime Unified Threat Management Ransmoware Fileless Malware Digital Security Cameras Refrigeration Unified Threat Management Public Speaking Content Remote Working Hosted Solution Wearable Technology Memory Vendors Comparison Google Play Be Proactive Lithium-ion battery Health IT Typing Motherboard Data Breach Assessment Electronic Health Records Entrepreneur Permissions Workforce Network Congestion Directions Videos Google Drive User Error Wasting Time Threats Knowledge Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Point of Sale Fraud Meta 5G Microchip Undo Google Docs Username Unified Communications Managing Costs Amazon Experience Black Friday SSID Bitcoin Network Management eCommerce Running Cable Tech Support Database Surveillance Virtual Assistant Outsource IT Monitors Google Wallet IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Windows 8 Application Cookies Laptop Websites Tactics Development Hotspot Transportation Small Businesses Drones SharePoint IBM Mirgation Hypervisor Displays Electronic Medical Records PowerPoint Shopping Nanotechnology Optimization Halloween Addiction Language Employer/Employee Relationships Outsourcing Writing Lenovo Management PCI DSS Chatbots Virtual Reality Navigation Distributed Denial of Service Workplace Gig Economy Hacks Server Management Screen Reader Scary Stories Private Cloud Service Level Agreement Internet Service Provider Identity Theft Computing Infrastructure Teamwork Hiring/Firing Fun Superfish Competition Regulations Compliance Deep Learning Identity Twitter Evernote Paperless Co-managed IT Bookmark Smart Tech Memes Error Download Net Neutrality Education Alerts SQL Server Technology Care Social Engineering Financial Data User History Remote Computing Business Communications Break Fix Scams Browsers Smartwatch Mobile Computing Connectivity IT Upload Procurement Tablet Azure Hybrid Work Search IP Address Social Network Telework Best Practice Cyber security Alert Multi-Factor Security Tech Human Resources Buisness File Sharing Dark Web Cables Dark Data CES Managed IT IoT Communitications

Blog Archive