Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Blockchain Wi-Fi Windows 10 Business Technology Apps Data Security Vendor Mobile Office Two-factor Authentication Gmail Tip of the week Chrome WiFi Budget Apple Networking Employer-Employee Relationship App BYOD Managed Services Mobile Device Management Voice over Internet Protocol Conferencing How To BDR Hacker HIPAA Avoiding Downtime Computing Applications Information Technology Marketing Access Control Office 365 Analytics Office Tips Augmented Reality Retail Storage Big Data Password Bring Your Own Device Managed IT Services Computers Operating System Router 2FA Physical Security Website Risk Management Virtual Private Network Health Healthcare Help Desk Document Management The Internet of Things Free Resource Project Management Windows 7 Telephone Social Scam Data loss Microsoft 365 Solutions Cooperation Customer Service Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime Excel Display Printer Paperless Office Remote Workers Infrastructure Firewall Monitoring Outlook iPhone Machine Learning Safety Money Saving Time Humor Vulnerabilities Data Privacy Managed IT Service Images 101 Maintenance Downloads Antivirus Sports Multi-Factor Authentication Mobility Mouse Licensing Administration Entertainment Customer Relationship Management Employees Integration Robot Telephone System Cost Management Hacking Presentation Settings Wireless Printing Holidays Content Filtering Wireless Technology IT Management YouTube Meetings Data Storage VPN Supply Chain Video Conferencing Cryptocurrency Modem User Tip Managed Services Provider Processor Virtual Machines Professional Services Computer Repair Mobile Security Word Virtual Desktop Data storage LiFi Smart Technology Smartwatch SharePoint Entrepreneur IT Addiction Scams Electronic Medical Records Language Procurement Management Azure Hybrid Work Halloween Chatbots Cyber security Screen Reader Tech Human Resources Writing Distributed Denial of Service Telework Lenovo Undo CES Communitications Service Level Agreement Cables Virtual Reality Computing Infrastructure Supply Chain Management Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Term Google Apps Fun FinTech Superfish Bookmark IT Assessment Deep Learning Download IT Maintenance Twitter Alerts Flexibility Value Business Intelligence Error Education Connectivity Shortcuts Social Engineering Break Fix Application Organization Browsers Digital Security Cameras Smart Devices Upload Ransmoware Remote Computing Multi-Factor Security IBM Remote Working Mobile Computing Social Network Memory Vendors Data Breach Tablet IoT Google Play Be Proactive Search Dark Web Videos Electronic Health Records Best Practice Trends Workforce Alert Dark Data Google Calendar Managed IT Customer Resource management Wasting Time Threats Buisness File Sharing Regulations Legal Data Analysis Trend Micro IT solutions Star Wars Security Cameras Workplace Strategies How To Microsoft Excel Competition Software as a Service Business Growth Gamification Meta Notifications Staff Travel Social Networking Legislation Managing Costs Amazon Techology Fileless Malware eCommerce Google Maps SSID Cortana Surveillance Alt Codes Content Virtual Assistant Outsource IT Wearable Technology Downtime Unified Threat Management Motherboard Media Comparison User Health IT Virtual Machine Environment Unified Threat Management Directions Hosted Solution Assessment Medical IT Permissions Reviews Development Typing Transportation Small Businesses Network Congestion Specifications IP Address Hypervisor Displays Google Drive User Error Microchip Optimization Internet Exlporer PowerPoint Knowledge Fraud Shopping Username Employer/Employee Relationships Outsourcing Point of Sale Navigation 5G Black Friday Recovery PCI DSS Gig Economy Google Docs Unified Communications Database Workplace Experience Hard Drives Domains Internet Service Provider Bitcoin Network Management Teamwork Hiring/Firing Running Cable Tech Support IT Technicians Cookies Evernote Paperless Monitors Cyber Monday Regulations Compliance Google Wallet Proxy Server Refrigeration Memes Tactics Co-managed IT Hotspot Public Speaking Net Neutrality Windows 8 SQL Server Technology Care Laptop Websites Mirgation History Nanotechnology Business Communications Lithium-ion battery Financial Data Drones

Blog Archive