Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Mobile Device Managed Service Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Government Business Continuity Blockchain Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Data Security Vendor Apps Two-factor Authentication Mobile Office Gmail App WiFi BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Apple Networking How To BDR HIPAA Computing Applications Information Technology Access Control Hacker Office 365 Avoiding Downtime Conferencing Marketing 2FA Big Data Operating System Router Physical Security Risk Management Virtual Private Network Healthcare Health Computers Help Desk Analytics Office Tips Augmented Reality Website Retail Storage Password Bring Your Own Device Managed IT Services Cooperation Windows 11 The Internet of Things Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Excel Vendor Management Social Cybercrime Remote Workers Display Printer Paperless Office Customer Service Infrastructure Free Resource Monitoring Project Management Windows 7 Document Management Microsoft 365 Solutions Telephone Scam Data loss Firewall Safety Holidays Robot Data Storage Telephone System Supply Chain Cost Management Video Conferencing Settings Wireless Managed Services Provider Printing Professional Services Content Filtering Virtual Machines IT Management YouTube Meetings VPN Cryptocurrency Modem Customer Relationship Management User Tip Processor iPhone Computer Repair Mobile Security Virtual Desktop Data storage Vulnerabilities LiFi Hacking Presentation Data Privacy Smart Technology Outlook Images 101 Wireless Technology Machine Learning Multi-Factor Authentication Money Saving Time Mobility Humor Managed IT Service Maintenance Downloads Word Antivirus Sports Employees Mouse Integration Licensing Administration Entertainment Surveillance Entrepreneur Virtual Assistant Outsource IT Best Practice Trends Alert Dark Data Google Calendar Virtual Machine Environment Managed IT Customer Resource management Media Buisness File Sharing Regulations Medical IT IT solutions Star Wars How To Microsoft Excel Reviews Legal Data Analysis Development Transportation Small Businesses Business Growth Gamification Notifications Staff Undo Legislation Hypervisor Displays Travel Social Networking PowerPoint Google Maps Cortana Shopping Optimization Techology Fileless Malware Employer/Employee Relationships Outsourcing Alt Codes Content Wearable Technology Comparison PCI DSS Health IT Navigation Downtime Unified Threat Management Motherboard Unified Threat Management Directions Workplace Hosted Solution Assessment Permissions Gig Economy Application Internet Service Provider Teamwork Hiring/Firing Typing IBM Network Congestion Specifications Regulations Compliance Evernote Paperless Google Drive User Error Microchip Co-managed IT Internet Exlporer Knowledge Fraud Memes Net Neutrality SQL Server Technology Care Username Point of Sale 5G Black Friday Financial Data History Business Communications Google Docs Scams Unified Communications Database Experience Smartwatch IT Competition Procurement Azure Hybrid Work Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Monitors Cyber Monday Telework Cyber security Google Wallet Proxy Server Tech Human Resources Cables Tactics Hotspot CES Communitications Supply Chain Management Windows 8 Laptop Websites Mirgation Nanotechnology FinTech User Drones Term Google Apps SharePoint IT Maintenance Addiction Electronic Medical Records Language IT Assessment Flexibility Value Business Intelligence Management Halloween Chatbots Screen Reader IP Address Writing Distributed Denial of Service Organization Lenovo Shortcuts Ransmoware Service Level Agreement Virtual Reality Computing Infrastructure Digital Security Cameras Smart Devices Remote Working Memory Vendors Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun Recovery Data Breach Superfish Bookmark Google Play Be Proactive Workforce Deep Learning Download Twitter Alerts Videos Hard Drives Electronic Health Records Domains Wasting Time Threats Error Education Connectivity Social Engineering Break Fix Trend Micro Browsers Security Cameras Workplace Strategies Meta Upload Remote Computing Refrigeration Software as a Service Public Speaking Multi-Factor Security Managing Costs Amazon Mobile Computing Social Network Tablet IoT Lithium-ion battery Search Dark Web eCommerce SSID

Blog Archive