Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Managed Service Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Smartphone AI Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing 2FA Bring Your Own Device Managed IT Services Big Data Operating System Router Physical Security Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Scam Data loss Excel The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Infrastructure Monitoring Document Management Remote Workers Windows 11 Firewall Telephone iPhone Mouse Supply Chain Licensing Safety Administration Vulnerabilities Entertainment Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management VPN Employees Data Privacy YouTube Meetings Integration Cryptocurrency Hacking User Tip Modem Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Word Managed IT Service Maintenance Downloads Antivirus Sports Education Connectivity IT Social Engineering Break Fix Entrepreneur Browsers Smartwatch Displays Upload Procurement Remote Computing Azure Multi-Factor Security Tech Mobile Computing Social Network Telework Outsourcing Cyber security Tablet IoT Communitications Undo Search Dark Web CES Best Practice Trends Supply Chain Management Workplace Alert Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Hiring/Firing Buisness File Sharing Regulations IT solutions Star Wars IT Assessment Paperless How To Microsoft Excel Legal Data Analysis Business Growth Gamification Flexibility Co-managed IT Notifications Staff Value Legislation Organization Technology Care Travel Social Networking Application Google Maps Smart Devices Business Communications Cortana Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working Scams IBM Wearable Technology Memory Comparison Google Play Health IT Hybrid Work Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Human Resources Permissions Unified Threat Management Directions Videos Typing Cables Wasting Time Network Congestion Specifications Security Cameras Trend Micro Internet Exlporer Software as a Service Google Apps Competition Knowledge Fraud Google Drive User Error Microchip Username IT Maintenance Managing Costs 5G Black Friday SSID Business Intelligence Point of Sale eCommerce Google Docs Unified Communications Database Surveillance Shortcuts Experience Virtual Assistant Bitcoin Network Management Ransmoware Running Cable Tech Support IT Technicians Virtual Machine User Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Vendors Tactics Development Be Proactive Hotspot Transportation Windows 8 Workforce IP Address Laptop Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Drones Shopping Threats SharePoint Addiction Workplace Strategies Electronic Medical Records Language Employer/Employee Relationships Navigation Management PCI DSS Meta Halloween Chatbots Recovery Screen Reader Hard Drives Writing Distributed Denial of Service Lenovo Gig Economy Amazon Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Evernote Hacks Server Management Regulations Compliance Outsource IT Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Media Refrigeration Fun Superfish Bookmark Environment Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Financial Data Small Businesses Lithium-ion battery Error History

Blog Archive