Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Passwords Quick Tips Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Covid-19 Training Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Vendor Mobile Office Two-factor Authentication Apps App BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Managed Services Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking BDR Hacker Avoiding Downtime HIPAA Computing Marketing Applications Information Technology Access Control Office 365 Conferencing How To Computers Operating System Router Website Virtual Private Network Risk Management Health 2FA Help Desk Analytics Office Tips Augmented Reality Retail Big Data Storage Healthcare Password Bring Your Own Device Managed IT Services Windows 7 Customer Service Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Physical Security Display Printer Firewall Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management The Internet of Things Remote Workers Social Telephone Scam Data loss Cooperation Free Resource Project Management Images 101 Hacking Multi-Factor Authentication Mobility Telephone System Presentation Robot Cost Management Settings Printing Wireless Technology Wireless Content Filtering IT Management VPN YouTube Meetings Employees Integration Cryptocurrency User Tip Modem Word Computer Repair Mobile Security Processor Holidays Virtual Desktop Data storage LiFi Data Storage Supply Chain Smart Technology Safety Video Conferencing Outlook Managed Services Provider Machine Learning Virtual Machines Professional Services Money Saving Time Humor Managed IT Service Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Administration Customer Relationship Management Data Privacy How To Microsoft Excel IT Assessment IT Maintenance Legal Data Analysis IT solutions Star Wars Business Growth Gamification Notifications Staff Flexibility Value Business Intelligence Shortcuts Travel Social Networking Legislation Organization Cortana Digital Security Cameras User Smart Devices Ransmoware Techology Fileless Malware Google Maps Alt Codes Content Wearable Technology Remote Working Memory Vendors Data Breach Google Play Be Proactive Health IT Downtime Unified Threat Management Motherboard Comparison Permissions Videos Electronic Health Records Workforce Unified Threat Management Directions Hosted Solution Assessment IP Address Typing Wasting Time Threats Trend Micro Security Cameras Workplace Strategies Network Congestion Specifications Knowledge Fraud Recovery Software as a Service Meta Google Drive User Error Microchip Internet Exlporer Username Hard Drives Managing Costs Amazon eCommerce SSID Point of Sale Domains 5G Black Friday Experience Surveillance Virtual Assistant Outsource IT Google Docs Unified Communications Database Media Bitcoin Network Management Running Cable Tech Support IT Technicians Refrigeration Virtual Machine Environment Reviews Medical IT Google Wallet Proxy Server Cookies Public Speaking Monitors Cyber Monday Lithium-ion battery Hotspot Development Transportation Small Businesses Tactics Hypervisor Displays Windows 8 Laptop Websites Mirgation Entrepreneur Shopping Optimization PowerPoint Drones Nanotechnology Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Navigation Management Halloween Chatbots Undo PCI DSS Writing Distributed Denial of Service Gig Economy Workplace Lenovo Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Hacks Server Management Scary Stories Private Cloud Identity Regulations Compliance Fun Memes Co-managed IT Superfish Bookmark Identity Theft Smart Tech Deep Learning Download Twitter Alerts Application Net Neutrality SQL Server Technology Care History Business Communications Error Financial Data Social Engineering Break Fix Smartwatch IT Scams Browsers Education Connectivity IBM Upload Remote Computing Procurement Azure Hybrid Work Cyber security Tech Human Resources Mobile Computing Social Network Multi-Factor Security Telework Search Dark Web CES Communitications Cables Tablet IoT Best Practice Trends Alert Supply Chain Management Term Google Apps Managed IT Customer Resource management Buisness File Sharing Regulations Competition Dark Data Google Calendar FinTech

Blog Archive