Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android Disaster Recovery Data Recovery AI Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Windows 10 Virtualization Blockchain Wi-Fi Business Technology Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Apple Networking Managed Services WiFi Voice over Internet Protocol App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing 2FA Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Firewall Telephone Scam Excel Data loss The Internet of Things Cooperation Remote Workers Social Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Cybercrime Project Management Windows 7 Physical Security Customer Service Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Monitoring Document Management Windows 11 Maintenance Data Storage Sports Downloads Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Licensing Safety Virtual Machines Professional Services Entertainment Administration Robot iPhone Telephone System Cost Management Settings Printing Wireless Vulnerabilities Content Filtering Data Privacy IT Management Customer Relationship Management VPN Images 101 YouTube Meetings Multi-Factor Authentication Mobility Cryptocurrency User Tip Modem Hacking Processor Presentation Computer Repair Mobile Security Virtual Desktop Data storage LiFi Wireless Technology Employees Smart Technology Integration Outlook Machine Learning Money Saving Time Humor Word Holidays Managed IT Service Hypervisor Displays Deep Learning Download Public Speaking Twitter Alerts Shopping Error Optimization PowerPoint Lithium-ion battery Browsers Education Connectivity Social Engineering Break Fix Entrepreneur Employer/Employee Relationships Outsourcing Navigation Upload PCI DSS Remote Computing Gig Economy Multi-Factor Security Workplace Mobile Computing Social Network Tablet IoT Undo Internet Service Provider Search Dark Web Teamwork Hiring/Firing Evernote Paperless Best Practice Trends Regulations Compliance Alert Buisness File Sharing Regulations Memes Dark Data Google Calendar Co-managed IT Managed IT Customer Resource management Legal Data Analysis IT solutions Star Wars Net Neutrality How To Microsoft Excel SQL Server Technology Care History Business Communications Business Growth Gamification Financial Data Notifications Staff Smartwatch Travel Social Networking Application IT Legislation Scams Techology Fileless Malware Google Maps Procurement Cortana Azure Hybrid Work Cyber security Tech Human Resources Alt Codes Content IBM Telework Wearable Technology Health IT CES Downtime Unified Threat Management Motherboard Communitications Comparison Cables Unified Threat Management Directions Hosted Solution Assessment Supply Chain Management Permissions Term Google Apps Typing FinTech IT Assessment Network Congestion Specifications IT Maintenance Google Drive User Error Microchip Internet Exlporer Competition Flexibility Knowledge Fraud Value Business Intelligence Shortcuts Username Organization Digital Security Cameras Point of Sale Smart Devices 5G Black Friday Ransmoware Google Docs Unified Communications Database Remote Working Experience Memory Vendors Running Cable Tech Support IT Technicians User Data Breach Google Play Be Proactive Bitcoin Network Management Google Wallet Proxy Server Videos Cookies Electronic Health Records Monitors Cyber Monday Workforce Tactics Hotspot Wasting Time Threats Laptop Websites Mirgation Trend Micro Security Cameras Workplace Strategies Windows 8 IP Address Drones Nanotechnology Software as a Service Meta SharePoint Addiction Electronic Medical Records Language Managing Costs Amazon Halloween Chatbots Recovery eCommerce SSID Management Lenovo Screen Reader Hard Drives Surveillance Writing Distributed Denial of Service Virtual Assistant Outsource IT Media Service Level Agreement Domains Virtual Reality Computing Infrastructure Virtual Machine Environment Reviews Scary Stories Private Cloud Identity Medical IT Hacks Server Management Superfish Bookmark Identity Theft Smart Tech Refrigeration Development Fun Transportation Small Businesses

Blog Archive