Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Google Phishing Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Holiday Automation Facebook Information Artificial Intelligence Miscellaneous Gadgets Training Compliance Cloud Computing Covid-19 Remote Work Server Outsourced IT Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Data Management Government Business Technology Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Apps Managed Services Mobile Office Two-factor Authentication Data Security Vendor Employer-Employee Relationship Apple Tip of the week App Voice over Internet Protocol Mobile Device Management Networking Gmail WiFi Chrome BYOD Budget Applications Access Control Hacker Conferencing Avoiding Downtime Marketing Computing Managed IT Services Information Technology How To BDR Office 365 HIPAA Physical Security Storage Virtual Private Network Password 2FA Bring Your Own Device Health Help Desk Computers Retail Website Operating System Healthcare Risk Management Analytics Office Tips Augmented Reality Big Data Router Windows 11 Display Printer Paperless Office Infrastructure Excel Customer Service Monitoring Going Green Document Management Managed IT Service Remote Workers Telephone Cybercrime Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring The Internet of Things Vulnerability End of Support Vendor Management Solutions Social User Tip Modem Sports Computer Repair Mobile Security Processor Mouse Customer Relationship Management Supply Chain Holidays Administration Data Storage Smart Technology Hacking Video Conferencing Presentation Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Wireless Technology Settings Wireless Printing Maintenance Content Filtering Antivirus Downloads iPhone Data Privacy YouTube Word Licensing Cryptocurrency Vulnerabilities Entertainment Images 101 Virtual Desktop LiFi Data storage Safety Telephone System Multi-Factor Authentication Robot Mobility Cost Management Outlook Money Humor IT Management VPN Employees Meetings Integration IBM Username Deep Learning Managing Costs Small Businesses Point of Sale eCommerce Black Friday SSID Education Virtual Assistant Displays Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Outsourcing Proxy Server Reviews Mobile Computing Cookies Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Search Competition Best Practice Websites Mirgation Hypervisor Workplace PowerPoint Hiring/Firing Shopping Nanotechnology Optimization Buisness Addiction IT solutions Electronic Medical Records Language Employer/Employee Relationships Paperless SharePoint Legal Management PCI DSS User Business Growth Chatbots Navigation Co-managed IT Writing Distributed Denial of Service Technology Care Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Cortana Business Communications IP Address Server Management Regulations Compliance Alt Codes Private Cloud Identity Evernote Scams Hybrid Work Superfish Bookmark Identity Theft Smart Tech Memes Downtime Download Net Neutrality Hosted Solution Twitter Alerts SQL Server Human Resources Financial Data Recovery Typing Error History Cables Social Engineering Break Fix Browsers Smartwatch Hard Drives Connectivity IT Upload Procurement Remote Computing Azure Knowledge Google Apps Domains Google Drive Social Network Telework Cyber security Multi-Factor Security Tech IT Maintenance Dark Web 5G Business Intelligence CES Refrigeration Tablet IoT Communitications Trends Supply Chain Management Unified Communications Alert Experience Shortcuts Public Speaking Google Docs Lithium-ion battery Managed IT Customer Resource management FinTech Bitcoin File Sharing Regulations Running Cable Dark Data Google Calendar Term Ransmoware How To Microsoft Excel Vendors Data Analysis Google Wallet Star Wars IT Assessment Entrepreneur Gamification Flexibility Notifications Staff Value Be Proactive Organization Windows 8 Travel Social Networking Laptop Legislation Workforce Threats Techology Fileless Malware Digital Security Cameras Undo Drones Google Maps Smart Devices Content Remote Working Wearable Technology Memory Workplace Strategies Health IT Unified Threat Management Motherboard Data Breach Halloween Comparison Google Play Meta Permissions Amazon Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Outsource IT Application Hacks Trend Micro Scary Stories Network Congestion Specifications Security Cameras Fraud Fun Environment Media User Error Microchip Internet Exlporer Software as a Service

Blog Archive