Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Facebook Miscellaneous Artificial Intelligence Cloud Computing Training Compliance Gadgets Covid-19 Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Business Technology Virtualization Blockchain Bandwidth Mobile Office Managed Services Two-factor Authentication Apps Vendor Data Security App BYOD Voice over Internet Protocol Mobile Device Management Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Networking Budget Apple Avoiding Downtime Marketing Physical Security Conferencing Computing Access Control Information Technology Office 365 HIPAA Managed IT Services Applications How To BDR Hacker Help Desk 2FA Website Healthcare Virtual Private Network Operating System Health Risk Management Big Data Retail Office Tips Analytics Augmented Reality Router Storage Password Computers Bring Your Own Device Remote Monitoring Windows 11 Monitoring End of Support Vulnerability Vendor Management Going Green Remote Workers Excel Display Managed IT Service Printer Firewall Telephone Cybercrime Paperless Office Infrastructure Free Resource Project Management Cooperation Windows 7 The Internet of Things Document Management Microsoft 365 Social Solutions Scam Data loss Customer Service Patch Management Save Money Video Conferencing Smart Technology Managed Services Provider Virtual Machines Professional Services IT Management Supply Chain Meetings Saving Time VPN Word Settings Printing Wireless Content Filtering iPhone Computer Repair Downloads YouTube Licensing Vulnerabilities Cryptocurrency Safety Entertainment Images 101 Machine Learning Multi-Factor Authentication Data Privacy Mobility Virtual Desktop Data storage LiFi Telephone System Cost Management Maintenance Outlook Antivirus Money Employees Integration Humor Customer Relationship Management User Tip Hacking Modem Sports Holidays Processor Mouse Presentation Mobile Security Robot Data Storage Wireless Technology Administration Mirgation Employer/Employee Relationships IP Address Best Practice Unified Threat Management Navigation Nanotechnology Buisness PCI DSS Small Businesses Unified Threat Management Displays Legal Addiction IT solutions Language Gig Economy Recovery Chatbots Internet Service Provider Teamwork Management Business Growth Outsourcing Evernote Network Congestion Hard Drives Screen Reader Distributed Denial of Service Regulations Compliance User Error Memes Domains Service Level Agreement Computing Infrastructure Cortana Alt Codes Identity Net Neutrality SQL Server Workplace History Hiring/Firing Point of Sale Bookmark Refrigeration Smart Tech Downtime Financial Data Alerts Smartwatch IT Paperless Public Speaking Download Hosted Solution Typing Procurement Network Management Azure Co-managed IT Tech Support Lithium-ion battery Cyber security Technology Care Tech Browsers Monitors Connectivity Entrepreneur Break Fix Telework Knowledge CES Communitications Business Communications Google Drive Upload Social Network Multi-Factor Security Supply Chain Management Scams Websites Hybrid Work Term Undo IoT Dark Web 5G FinTech Experience SharePoint IT Assessment Human Resources Google Docs Electronic Medical Records Trends Unified Communications Customer Resource management Bitcoin Regulations Running Cable Google Calendar Flexibility Value Cables Lenovo Data Analysis Google Wallet Writing Star Wars Microsoft Excel Organization Staff Digital Security Cameras Smart Devices Google Apps Virtual Reality Gamification Private Cloud Windows 8 Application Social Networking Laptop Legislation Remote Working Server Management Memory IT Maintenance Superfish Data Breach Business Intelligence Identity Theft Google Play Fileless Malware Drones Wearable Technology Videos Electronic Health Records Shortcuts Twitter IBM Content Error Health IT Motherboard Halloween Comparison Wasting Time Ransmoware Trend Micro Vendors Security Cameras Directions Social Engineering Assessment Permissions Software as a Service Be Proactive Remote Computing Hacks Scary Stories Specifications Managing Costs Workforce eCommerce Threats Tablet SSID Microchip Competition Internet Exlporer Fraud Fun Surveillance Virtual Assistant Workplace Strategies Alert Username Deep Learning File Sharing Dark Data Black Friday Managed IT Virtual Machine Meta Amazon Medical IT How To Database Education Reviews User IT Technicians Development Transportation Notifications Travel Proxy Server Mobile Computing Cookies Cyber Monday Hypervisor Outsource IT Techology Optimization Environment Google Maps PowerPoint Media Tactics Hotspot Search Shopping

Blog Archive