Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Microsoft Productivity Managed Service Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Covid-19 Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Tip of the week Chrome Managed Services Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR HIPAA Computing Applications Information Technology Computers 2FA Help Desk Health Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Physical Security Virtual Private Network Risk Management Printer Windows 11 Monitoring Paperless Office Infrastructure Excel Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Microsoft 365 Going Green Patch Management Social Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Customer Service Display Presentation Holidays Computer Repair Data Storage Virtual Desktop Data storage LiFi Wireless Technology Smart Technology Supply Chain Video Conferencing Managed Services Provider Professional Services Outlook Saving Time Virtual Machines Machine Learning Money Word Managed IT Service Humor Downloads iPhone Maintenance Sports Licensing Antivirus Mouse Vulnerabilities Entertainment Safety Data Privacy Administration Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Robot Settings Printing Wireless Employees Content Filtering Integration IT Management Customer Relationship Management VPN YouTube Meetings User Tip Modem Mobile Security Processor Cryptocurrency Hacking Google Docs Proxy Server Reviews Unified Communications Cookies Experience Cyber Monday Medical IT Running Cable Tech Support User Hotspot Transportation Small Businesses Bitcoin Network Management Tactics Development Google Wallet Mirgation Hypervisor Displays Monitors Shopping Nanotechnology Optimization PowerPoint Addiction Laptop Websites Language Employer/Employee Relationships Outsourcing Windows 8 IP Address Drones Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace SharePoint Gig Economy Screen Reader Electronic Medical Records Service Level Agreement Internet Service Provider Halloween Recovery Computing Infrastructure Teamwork Hiring/Firing Lenovo Regulations Compliance Hard Drives Identity Writing Evernote Paperless Co-managed IT Bookmark Domains Smart Tech Memes Virtual Reality Download Net Neutrality Scary Stories Private Cloud Alerts SQL Server Technology Care Hacks Server Management Superfish Financial Data Identity Theft Refrigeration History Fun Business Communications Break Fix Scams Browsers Smartwatch Deep Learning Public Speaking Connectivity IT Twitter Lithium-ion battery Upload Procurement Error Azure Hybrid Work Social Network Telework Education Cyber security Social Engineering Entrepreneur Multi-Factor Security Tech Human Resources Dark Web Cables CES IoT Communitications Remote Computing Mobile Computing Trends Supply Chain Management Customer Resource management FinTech Tablet Undo Regulations Search Google Calendar Term Google Apps Alert Microsoft Excel IT Maintenance Data Analysis Best Practice Star Wars IT Assessment Managed IT Gamification Flexibility Buisness File Sharing Staff Value Business Intelligence Dark Data Legal Organization IT solutions Social Networking How To Legislation Shortcuts Notifications Ransmoware Fileless Malware Digital Security Cameras Business Growth Smart Devices Content Remote Working Travel Application Wearable Technology Memory Vendors Techology Health IT Google Maps Motherboard Data Breach Cortana Comparison Google Play Be Proactive Permissions Workforce Directions Videos Alt Codes IBM Assessment Electronic Health Records Downtime Unified Threat Management Wasting Time Threats Unified Threat Management Hosted Solution Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Typing Internet Exlporer Software as a Service Username Managing Costs Amazon Network Congestion Google Drive User Error Competition eCommerce Knowledge Black Friday SSID Virtual Assistant Outsource IT Database Surveillance Point of Sale IT Technicians Virtual Machine Environment 5G Media

Blog Archive