Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Information Holiday Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Gadgets Training Compliance Remote Work Server Outsourced IT Managed Service Provider IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Government Business Continuity Blockchain Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Vendor Apps Two-factor Authentication Managed Services Mobile Office Data Security Gmail App WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Voice over Internet Protocol Budget Networking Mobile Device Management Apple HIPAA Physical Security Computing Applications Information Technology Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing Managed IT Services How To BDR Router Operating System Big Data Virtual Private Network Risk Management Health 2FA Help Desk Computers Analytics Office Tips Augmented Reality Retail Healthcare Website Storage Password Bring Your Own Device Patch Management Save Money Microsoft 365 Going Green Remote Monitoring End of Support Vulnerability Vendor Management Solutions The Internet of Things Cybercrime Social Display Printer Paperless Office Windows 11 Infrastructure Monitoring Customer Service Excel Document Management Managed IT Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Robot Mobility Telephone System Multi-Factor Authentication Cost Management Safety Settings Printing IT Management Wireless Meetings VPN Employees Content Filtering Integration YouTube Modem User Tip Processor Computer Repair Mobile Security Cryptocurrency Holidays Customer Relationship Management Virtual Desktop Data Storage Smart Technology Supply Chain Data storage LiFi Video Conferencing Hacking Machine Learning Managed Services Provider Virtual Machines Professional Services Presentation Outlook Saving Time Money Wireless Technology Humor Maintenance Downloads Antivirus iPhone Sports Licensing Mouse Vulnerabilities Word Entertainment Data Privacy Administration Images 101 Legislation Shortcuts Legal Entrepreneur IT solutions Organization Travel Social Networking Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Business Growth Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Undo Health IT Cortana Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Alt Codes Downtime Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Hosted Solution User Error Microchip Internet Exlporer Software as a Service Fraud Meta Typing Application Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Google Drive Knowledge Database Surveillance Virtual Assistant Outsource IT IBM Media Network Management 5G Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Google Docs Unified Communications Proxy Server Reviews Experience Running Cable Tactics Development Hotspot Transportation Small Businesses Bitcoin Google Wallet Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Competition Shopping SharePoint Laptop Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Windows 8 Navigation Drones Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Halloween Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing User Evernote Paperless Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Superfish Bookmark Hacks Scary Stories Download Net Neutrality Twitter Alerts SQL Server Technology Care IP Address Business Communications Financial Data Fun Error History Connectivity IT Social Engineering Break Fix Scams Deep Learning Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work Recovery Multi-Factor Security Tech Human Resources Hard Drives Education Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables Domains CES Mobile Computing Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Refrigeration Managed IT Customer Resource management FinTech Search File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Public Speaking Best Practice Data Analysis Buisness Gamification Flexibility Notifications Staff Value Business Intelligence Lithium-ion battery

Blog Archive