Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Facebook Holiday Miscellaneous Artificial Intelligence Automation Training Gadgets Compliance Cloud Computing Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Vendor Two-factor Authentication Apps Managed Services Mobile Office Data Security WiFi Employer-Employee Relationship Chrome Budget Tip of the week Voice over Internet Protocol Apple Networking App Mobile Device Management Gmail BYOD Physical Security Applications Office 365 Access Control Password Conferencing Hacker Avoiding Downtime Marketing Managed IT Services How To BDR Computing HIPAA Information Technology Router 2FA Virtual Private Network Big Data Analytics Office Tips Health Augmented Reality Help Desk Storage Computers Bring Your Own Device Retail Healthcare Website Operating System Risk Management The Internet of Things Windows 11 Display Social Printer Excel Paperless Office Infrastructure Monitoring Document Management Customer Service Remote Workers Managed IT Service Telephone Scam Data loss Going Green Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Cybercrime Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions VPN Employees Meetings Integration Virtual Desktop User Tip LiFi Modem Data storage Supply Chain Processor Computer Repair Mobile Security Holidays Outlook Money Data Storage Customer Relationship Management Smart Technology Humor Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Sports Hacking Presentation Mouse Data Privacy Maintenance Administration Wireless Technology Downloads Antivirus iPhone Licensing Entertainment Vulnerabilities Word Images 101 Settings Wireless Printing Multi-Factor Authentication Content Filtering Robot Mobility Telephone System Cost Management YouTube Cryptocurrency Safety IT Management Unified Communications Trend Micro Experience Network Congestion Specifications Security Cameras Google Docs Small Businesses User Error Microchip Bitcoin Internet Exlporer Software as a Service Running Cable Fraud Managing Costs Displays Google Wallet Username Point of Sale eCommerce Black Friday SSID Outsourcing Windows 8 Database Surveillance Laptop Virtual Assistant Application Tech Support IT Technicians Virtual Machine Drones Network Management Proxy Server Reviews Cookies IBM Monitors Cyber Monday Medical IT Workplace Hiring/Firing Tactics Development Halloween Hotspot Transportation Websites Mirgation Hypervisor Paperless Co-managed IT Shopping Nanotechnology Optimization PowerPoint Technology Care SharePoint Hacks Addiction Scary Stories Electronic Medical Records Language Employer/Employee Relationships Chatbots Competition Fun Navigation Business Communications Management PCI DSS Scams Lenovo Gig Economy Deep Learning Screen Reader Writing Distributed Denial of Service Hybrid Work Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Education Private Cloud Identity Evernote Human Resources Server Management Regulations Compliance Cables Superfish Bookmark Identity Theft Smart Tech Memes User Mobile Computing Download Net Neutrality Twitter Alerts SQL Server Error History Search Google Apps Financial Data IT Maintenance Browsers Smartwatch Best Practice Connectivity IT IP Address Social Engineering Break Fix Business Intelligence Upload Procurement Buisness Remote Computing Azure IT solutions Cyber security Multi-Factor Security Tech Legal Shortcuts Social Network Telework Ransmoware CES Business Growth Tablet IoT Communitications Dark Web Recovery Hard Drives Vendors Trends Supply Chain Management Alert File Sharing Regulations Domains Cortana Dark Data Google Calendar Term Be Proactive Managed IT Customer Resource management FinTech Workforce Data Analysis Alt Codes Star Wars IT Assessment How To Microsoft Excel Refrigeration Threats Gamification Flexibility Downtime Notifications Staff Value Hosted Solution Travel Social Networking Public Speaking Legislation Workplace Strategies Organization Meta Techology Fileless Malware Digital Security Cameras Typing Google Maps Smart Devices Lithium-ion battery Entrepreneur Amazon Content Remote Working Wearable Technology Memory Health IT Unified Threat Management Motherboard Data Breach Knowledge Comparison Google Play Google Drive Outsource IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Wasting Time Undo 5G Environment Media

Blog Archive