Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Compliance Cloud Computing Gadgets Covid-19 Training Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Blockchain Virtualization Wi-Fi Business Technology Data Security Vendor Apps Two-factor Authentication Mobile Office Managed Services Chrome Networking Gmail Budget WiFi Apple BYOD App Employer-Employee Relationship Tip of the week Mobile Device Management Voice over Internet Protocol Managed IT Services How To BDR HIPAA Physical Security Applications Access Control Computing Hacker Information Technology Avoiding Downtime Conferencing Marketing Office 365 Augmented Reality Healthcare Storage Password Bring Your Own Device Big Data Router Virtual Private Network Operating System Health Computers Help Desk Risk Management 2FA Website Retail Office Tips Analytics Firewall Cooperation The Internet of Things Patch Management Free Resource Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Social Vendor Management Microsoft 365 Going Green Solutions Display Printer Customer Service Paperless Office Infrastructure Cybercrime Monitoring Windows 11 Document Management Excel Managed IT Service Telephone Scam Data loss Remote Workers Money Humor Entertainment iPhone Safety Sports Vulnerabilities Mouse Telephone System Data Privacy Robot Cost Management Images 101 Administration Mobility Multi-Factor Authentication IT Management VPN Meetings Customer Relationship Management User Tip Modem Settings Computer Repair Mobile Security Employees Processor Printing Integration Wireless Content Filtering Hacking Presentation YouTube Smart Technology Holidays Cryptocurrency Wireless Technology Machine Learning Data Storage Saving Time Supply Chain Video Conferencing Virtual Desktop Data storage LiFi Managed Services Provider Virtual Machines Maintenance Professional Services Antivirus Word Downloads Outlook Licensing Public Speaking Net Neutrality Social Network SQL Server Technology Care Multi-Factor Security Business Communications Dark Web Lithium-ion battery Financial Data History Tablet IoT Hacks IT Trends Entrepreneur Scary Stories Scams Alert Smartwatch Procurement Managed IT Customer Resource management Azure Hybrid Work File Sharing Regulations Fun Dark Data Google Calendar Tech Human Resources How To Microsoft Excel Telework Data Analysis Deep Learning Cyber security Star Wars Undo Communitications Gamification Cables Notifications Staff CES Supply Chain Management Education Travel Social Networking Legislation Term Google Apps FinTech Techology Fileless Malware Google Maps Mobile Computing IT Assessment Content IT Maintenance Wearable Technology Flexibility Health IT Value Business Intelligence Unified Threat Management Motherboard Search Comparison Shortcuts Permissions Organization Unified Threat Management Directions Application Best Practice Assessment Smart Devices Buisness Ransmoware Digital Security Cameras IBM Legal Remote Working IT solutions Memory Vendors Network Congestion Specifications Internet Exlporer Google Play Be Proactive Fraud User Error Microchip Business Growth Data Breach Electronic Health Records Username Workforce Videos Black Friday Wasting Time Threats Point of Sale Cortana Database Security Cameras Workplace Strategies Alt Codes Trend Micro Competition Software as a Service Network Management Downtime Meta Tech Support IT Technicians Monitors Cyber Monday Proxy Server Hosted Solution Managing Costs Amazon Cookies eCommerce Tactics SSID Hotspot Typing Surveillance Virtual Assistant Outsource IT Websites Mirgation Media Google Drive User Virtual Machine Environment Nanotechnology Knowledge Addiction Medical IT Electronic Medical Records Language Reviews SharePoint Development Management Transportation Small Businesses Chatbots 5G Writing Distributed Denial of Service IP Address Google Docs Lenovo Unified Communications Hypervisor Displays Screen Reader Experience Optimization Service Level Agreement Running Cable PowerPoint Virtual Reality Computing Infrastructure Shopping Bitcoin Google Wallet Server Management Employer/Employee Relationships Outsourcing Private Cloud Identity Navigation PCI DSS Superfish Bookmark Recovery Identity Theft Smart Tech Hard Drives Windows 8 Download Laptop Workplace Twitter Alerts Gig Economy Domains Drones Internet Service Provider Teamwork Hiring/Firing Error Evernote Paperless Social Engineering Break Fix Regulations Compliance Browsers Connectivity Refrigeration Memes Upload Halloween Co-managed IT Remote Computing

Blog Archive