Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Gadgets Training Covid-19 Cloud Computing Server Compliance Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Apps Two-factor Authentication Mobile Office Data Security Vendor Managed Services Employer-Employee Relationship Voice over Internet Protocol Tip of the week Chrome Budget Apple Networking Mobile Device Management App Gmail WiFi BYOD Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To BDR HIPAA Computing Applications Information Technology Health Healthcare Help Desk Analytics Office Tips Augmented Reality Computers Retail Storage Password Website Bring Your Own Device Managed IT Services Operating System Router 2FA Physical Security Big Data Virtual Private Network Risk Management Printer Paperless Office Remote Workers Infrastructure Monitoring Customer Service Document Management Free Resource Project Management Windows 7 Telephone Scam Data loss Microsoft 365 Cooperation Solutions Firewall Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 The Internet of Things Cybercrime Social Display Excel Virtual Machines Computer Repair Mobile Security Professional Services Processor Virtual Desktop Data storage Customer Relationship Management LiFi Smart Technology iPhone Outlook Hacking Machine Learning Money Saving Time Presentation Vulnerabilities Humor Data Privacy Managed IT Service Wireless Technology Maintenance Images 101 Antivirus Sports Downloads Mobility Mouse Multi-Factor Authentication Licensing Word Entertainment Administration Employees Integration Telephone System Robot Cost Management Safety Settings Printing Wireless Content Filtering Holidays IT Management VPN Data Storage YouTube Meetings Supply Chain Cryptocurrency Video Conferencing User Tip Modem Managed Services Provider Experience Workplace Google Docs Gig Economy IBM Unified Communications Database Bitcoin Network Management Internet Service Provider Running Cable Tech Support IT Technicians Teamwork Hiring/Firing Evernote Paperless Google Wallet Proxy Server Regulations Compliance Cookies Monitors Cyber Monday Memes Hotspot Co-managed IT Tactics Windows 8 Net Neutrality Laptop Websites Mirgation SQL Server Technology Care Business Communications Drones Financial Data Competition Nanotechnology History Addiction IT Electronic Medical Records Language Scams SharePoint Smartwatch Management Procurement Halloween Chatbots Azure Hybrid Work Writing Distributed Denial of Service Tech Human Resources Lenovo Telework Screen Reader Cyber security Service Level Agreement Communitications User Virtual Reality Computing Infrastructure Cables CES Hacks Server Management Supply Chain Management Scary Stories Private Cloud Identity Fun Term Google Apps Superfish Bookmark FinTech Identity Theft Smart Tech IP Address Deep Learning Download IT Assessment Twitter Alerts IT Maintenance Flexibility Error Value Business Intelligence Social Engineering Break Fix Shortcuts Browsers Organization Education Connectivity Upload Smart Devices Recovery Remote Computing Ransmoware Digital Security Cameras Mobile Computing Social Network Remote Working Hard Drives Memory Vendors Multi-Factor Security Search Dark Web Google Play Be Proactive Domains Tablet IoT Data Breach Best Practice Trends Electronic Health Records Alert Workforce Videos Managed IT Customer Resource management Refrigeration Buisness File Sharing Regulations Wasting Time Threats Dark Data Google Calendar How To Microsoft Excel Security Cameras Workplace Strategies Legal Data Analysis Public Speaking IT solutions Star Wars Trend Micro Lithium-ion battery Business Growth Gamification Software as a Service Notifications Staff Meta Travel Social Networking Managing Costs Amazon Entrepreneur Legislation Cortana SSID Techology Fileless Malware Google Maps eCommerce Alt Codes Content Surveillance Wearable Technology Virtual Assistant Outsource IT Health IT Undo Downtime Unified Threat Management Motherboard Virtual Machine Environment Comparison Media Permissions Medical IT Unified Threat Management Directions Reviews Hosted Solution Assessment Typing Development Transportation Small Businesses Hypervisor Displays Network Congestion Specifications Knowledge Fraud PowerPoint Google Drive User Error Microchip Shopping Internet Exlporer Optimization Username Application Employer/Employee Relationships Outsourcing PCI DSS Point of Sale 5G Black Friday Navigation

Blog Archive