Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Facebook Artificial Intelligence Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Virtualization Business Technology Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps Managed Services Apple Voice over Internet Protocol App Networking Mobile Device Management BYOD Gmail WiFi Chrome Budget Tip of the week Employer-Employee Relationship Conferencing Hacker How To Avoiding Downtime BDR Marketing Computing Information Technology HIPAA Applications Office 365 Access Control Retail Healthcare Computers Managed IT Services Operating System Website Risk Management Router Physical Security Virtual Private Network Analytics Office Tips Augmented Reality Big Data Health 2FA Help Desk Storage Password Bring Your Own Device Remote Workers Customer Service Telephone Scam Data loss Going Green Cooperation Free Resource Project Management Windows 7 Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Firewall Vendor Management Solutions Display Printer The Internet of Things Paperless Office Windows 11 Infrastructure Social Monitoring Excel Document Management Administration Managed IT Service Maintenance Hacking Downloads Antivirus Presentation iPhone Licensing Entertainment Wireless Technology Vulnerabilities Data Privacy Settings Wireless Printing Images 101 Content Filtering Multi-Factor Authentication YouTube Robot Mobility Telephone System Cost Management Word Cryptocurrency IT Management VPN Employees Meetings Virtual Desktop Data storage LiFi Integration Safety User Tip Modem Processor Outlook Computer Repair Mobile Security Money Holidays Humor Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Sports Saving Time Mouse Virtual Machines Professional Services Customer Relationship Management Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Mobile Computing Superfish Bookmark Competition Identity Theft Smart Tech Memes Co-managed IT Search Download Net Neutrality Best Practice Twitter Alerts SQL Server Technology Care Error History Buisness Business Communications Financial Data Browsers Smartwatch Legal Connectivity IT IT solutions Social Engineering Break Fix Scams Upload Procurement Business Growth User Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES Tablet IoT Communitications Dark Web Cables Cortana IP Address Trends Supply Chain Management Alt Codes Alert File Sharing Regulations Downtime Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment Hosted Solution How To Microsoft Excel IT Maintenance Gamification Flexibility Typing Recovery Notifications Staff Value Business Intelligence Hard Drives Travel Social Networking Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Drive Domains Google Maps Smart Devices Ransmoware Knowledge Content Remote Working Wearable Technology Memory Vendors Refrigeration Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive 5G Health IT Unified Threat Management Directions Videos Google Docs Public Speaking Assessment Electronic Health Records Unified Communications Permissions Workforce Experience Lithium-ion battery Bitcoin Wasting Time Threats Running Cable Google Wallet Trend Micro Entrepreneur Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Laptop Username Windows 8 Drones Undo Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Halloween Media Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Scary Stories Hacks Application Shopping Nanotechnology Optimization PowerPoint Fun SharePoint IBM Addiction Deep Learning Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Education Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing

Blog Archive