Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service AI Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Automation Artificial Intelligence Facebook Holiday Covid-19 Compliance Cloud Computing Gadgets Training Server IT Support Managed Service Provider Outsourced IT Remote Work Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Managed Services Apps Tip of the week Chrome Budget Mobile Device Management Networking Gmail Apple App WiFi BYOD Employer-Employee Relationship Voice over Internet Protocol Hacker Office 365 Avoiding Downtime Conferencing Marketing Password Managed IT Services How To BDR Physical Security HIPAA Computing Applications Information Technology Access Control Computers Help Desk Analytics Office Tips Retail Website Augmented Reality Storage Bring Your Own Device 2FA Big Data Operating System Router Virtual Private Network Health Risk Management Healthcare Customer Service Monitoring Free Resource Document Management Project Management Windows 7 Managed IT Service Microsoft 365 Scam Data loss Telephone Solutions Firewall Cooperation Patch Management Save Money Remote Monitoring The Internet of Things Windows 11 Vulnerability End of Support Going Green Vendor Management Social Excel Cybercrime Display Printer Remote Workers Paperless Office Infrastructure iPhone Hacking Presentation Virtual Desktop Smart Technology Data storage Machine Learning LiFi Vulnerabilities Data Privacy Wireless Technology Images 101 Outlook Saving Time Maintenance Money Multi-Factor Authentication Mobility Antivirus Humor Word Downloads Sports Licensing Employees Mouse Entertainment Integration Administration Safety Robot Holidays Telephone System Cost Management Data Storage IT Management Supply Chain Settings VPN Meetings Video Conferencing Printing Managed Services Provider Wireless Virtual Machines Professional Services Content Filtering Computer Repair YouTube Customer Relationship Management User Tip Modem Mobile Security Processor Cryptocurrency Cyber Monday Smartwatch Google Docs Websites IT Proxy Server Unified Communications Scams Cookies Experience Tactics Running Cable Hotspot Procurement Bitcoin Azure Hybrid Work Telework Google Wallet Electronic Medical Records Cyber security Tech Human Resources Mirgation SharePoint CES Communitications Cables User Nanotechnology Addiction Laptop Language Lenovo Supply Chain Management Windows 8 Writing FinTech Drones Virtual Reality Management Term Google Apps Chatbots Distributed Denial of Service Server Management Private Cloud IT Assessment IP Address IT Maintenance Screen Reader Value Business Intelligence Service Level Agreement Halloween Computing Infrastructure Superfish Identity Theft Flexibility Organization Twitter Shortcuts Identity Digital Security Cameras Error Smart Devices Bookmark Ransmoware Recovery Smart Tech Social Engineering Memory Vendors Hard Drives Download Scary Stories Alerts Remote Working Hacks Remote Computing Data Breach Domains Google Play Be Proactive Fun Break Fix Videos Electronic Health Records Browsers Deep Learning Workforce Connectivity Wasting Time Threats Refrigeration Upload Tablet Alert Trend Micro Public Speaking Social Network Education Security Cameras Workplace Strategies Multi-Factor Security Dark Web Managed IT File Sharing Software as a Service Lithium-ion battery Dark Data Meta IoT Mobile Computing How To Managing Costs Amazon Trends Entrepreneur Notifications eCommerce Customer Resource management SSID Regulations Search Google Calendar Microsoft Excel Travel Surveillance Data Analysis Best Practice Virtual Assistant Outsource IT Star Wars Virtual Machine Environment Undo Gamification Buisness Media Staff Techology Google Maps Reviews Legal IT solutions Medical IT Social Networking Legislation Unified Threat Management Development Fileless Malware Business Growth Transportation Small Businesses Hypervisor Displays Content Wearable Technology Unified Threat Management Shopping Optimization Health IT PowerPoint Motherboard Cortana Comparison Permissions Directions Alt Codes Network Congestion Employer/Employee Relationships Outsourcing Application Assessment Downtime Navigation User Error PCI DSS Gig Economy IBM Hosted Solution Workplace Specifications Internet Exlporer Fraud Point of Sale Internet Service Provider Microchip Typing Teamwork Hiring/Firing Username Evernote Paperless Regulations Compliance Black Friday Network Management Google Drive Tech Support Memes Co-managed IT Knowledge Database Net Neutrality Monitors SQL Server Technology Care History Competition Business Communications IT Technicians 5G Financial Data

Blog Archive