Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Information Facebook Holiday Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Compliance Managed Service Provider Remote Work Server IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Government Data Management Business Continuity Windows 10 Blockchain Bandwidth Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Networking Mobile Device Management Chrome Gmail Budget BYOD WiFi Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Marketing How To Office 365 BDR HIPAA Applications Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Router Bring Your Own Device Physical Security 2FA Virtual Private Network Big Data Health Help Desk Operating System Computers Retail Risk Management Healthcare Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Windows 11 The Internet of Things Display Printer Social Excel Paperless Office Infrastructure Going Green Monitoring Customer Service Document Management Cybercrime Remote Workers Telephone Scam Data loss Virtual Desktop Entertainment Data storage LiFi Vulnerabilities Word Images 101 Outlook Telephone System Money Multi-Factor Authentication Robot Mobility Humor Cost Management Safety Sports IT Management VPN Employees Mouse Meetings Integration User Tip Modem Supply Chain Administration Processor Computer Repair Mobile Security Holidays Data Storage Customer Relationship Management Smart Technology Settings Video Conferencing Printing Machine Learning Managed Services Provider Wireless Saving Time Virtual Machines Professional Services Content Filtering Hacking YouTube Presentation Managed IT Service Maintenance Data Privacy Cryptocurrency Antivirus Downloads Wireless Technology iPhone Licensing Social Network Telework Google Wallet Cyber security Shortcuts Multi-Factor Security Tech Recovery CES Tablet IoT Communitications Ransmoware Dark Web Alert Laptop Hard Drives Trends Supply Chain Management Vendors Windows 8 Managed IT Customer Resource management FinTech Drones File Sharing Regulations Be Proactive Dark Data Google Calendar Term Domains Data Analysis Star Wars IT Assessment Workforce How To Microsoft Excel Notifications Staff Value Halloween Refrigeration Gamification Flexibility Threats Organization Travel Social Networking Workplace Strategies Legislation Public Speaking Lithium-ion battery Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Meta Hacks Wearable Technology Memory Scary Stories Entrepreneur Content Remote Working Amazon Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Fun Unified Threat Management Directions Videos Assessment Electronic Health Records Outsource IT Deep Learning Permissions Wasting Time Media Undo Environment Trend Micro Education Network Congestion Specifications Security Cameras User Error Microchip Internet Exlporer Software as a Service Small Businesses Fraud Mobile Computing Managing Costs Username Displays Point of Sale eCommerce Black Friday SSID Search Application Database Surveillance Outsourcing Best Practice Virtual Assistant Tech Support IT Technicians Virtual Machine Buisness Network Management Proxy Server Reviews Legal Cookies Workplace IT solutions Monitors Cyber Monday Medical IT IBM Tactics Development Hiring/Firing Business Growth Hotspot Transportation Websites Mirgation Hypervisor Paperless Shopping Nanotechnology Optimization Co-managed IT PowerPoint Cortana SharePoint Addiction Technology Care Alt Codes Electronic Medical Records Language Employer/Employee Relationships Management PCI DSS Chatbots Business Communications Downtime Navigation Competition Lenovo Gig Economy Screen Reader Scams Hosted Solution Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Service Level Agreement Internet Service Provider Hybrid Work Typing Server Management Regulations Compliance Private Cloud Identity Human Resources Evernote User Superfish Bookmark Google Drive Identity Theft Smart Tech Memes Cables Knowledge Twitter Alerts SQL Server Download Net Neutrality Financial Data Error History Google Apps 5G IP Address Browsers Smartwatch Google Docs Connectivity IT IT Maintenance Unified Communications Social Engineering Break Fix Experience Remote Computing Azure Running Cable Upload Procurement Business Intelligence Bitcoin

Blog Archive