Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Remote Work Server Compliance Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Wi-Fi Business Technology Windows 10 Blockchain Vendor Data Security Apps Two-factor Authentication Mobile Office Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome HIPAA Applications How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 Retail Storage Password Router Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Operating System Computers Physical Security Virtual Private Network Healthcare Risk Management Website Health Analytics Office Tips Augmented Reality Solutions The Internet of Things Scam Data loss Social Windows 11 Monitoring Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Excel Vendor Management Customer Service Cybercrime Remote Workers Display Telephone Printer Paperless Office Infrastructure Free Resource Cooperation Project Management Windows 7 Firewall Document Management Microsoft 365 Maintenance Safety Antivirus Sports Employees Mouse Integration Administration User Tip Modem Mobile Security Processor Holidays Robot Data Storage Supply Chain Smart Technology Customer Relationship Management Video Conferencing Settings Wireless Managed Services Provider Printing Professional Services Content Filtering Saving Time Virtual Machines Hacking IT Management Presentation VPN YouTube Meetings Managed IT Service Cryptocurrency Wireless Technology Downloads iPhone Computer Repair Licensing Virtual Desktop Vulnerabilities LiFi Entertainment Data storage Data Privacy Word Images 101 Outlook Machine Learning Telephone System Multi-Factor Authentication Money Mobility Cost Management Humor Remote Working Content Memory Vendors Wearable Technology Hacks Server Management Entrepreneur Scary Stories Private Cloud Fun Health IT Data Breach Motherboard Superfish Be Proactive Comparison Google Play Identity Theft Workforce Permissions Deep Learning Twitter Videos Directions Electronic Health Records Assessment Undo Wasting Time Threats Error Social Engineering Trend Micro Workplace Strategies Specifications Security Cameras Education Meta Fraud Remote Computing Microchip Software as a Service Internet Exlporer Username Managing Costs Amazon Mobile Computing Tablet Search eCommerce Black Friday SSID Surveillance Database Application Virtual Assistant Outsource IT Best Practice Alert Dark Data Virtual Machine Environment IT Technicians Managed IT Media Buisness File Sharing Medical IT Cyber Monday IT solutions How To Reviews Proxy Server IBM Cookies Legal Development Tactics Transportation Small Businesses Hotspot Business Growth Notifications Hypervisor Displays Mirgation Travel PowerPoint Google Maps Cortana Shopping Optimization Nanotechnology Techology Addiction Employer/Employee Relationships Outsourcing Language Alt Codes PCI DSS Management Competition Chatbots Navigation Downtime Unified Threat Management Workplace Distributed Denial of Service Hosted Solution Gig Economy Screen Reader Unified Threat Management Internet Service Provider Service Level Agreement Teamwork Hiring/Firing Computing Infrastructure Typing Network Congestion Regulations Compliance Identity Paperless Evernote User Co-managed IT Knowledge Bookmark Memes Smart Tech Google Drive User Error Net Neutrality Download SQL Server Technology Care Alerts 5G Financial Data History Business Communications Point of Sale Scams Break Fix Unified Communications Experience Smartwatch Browsers IP Address IT Connectivity Google Docs Procurement Upload Azure Hybrid Work Bitcoin Network Management Running Cable Tech Support Monitors Telework Social Network Cyber security Google Wallet Human Resources Multi-Factor Security Tech Recovery Cables Dark Web CES Communitications IoT Supply Chain Management Trends Hard Drives Windows 8 Laptop Websites FinTech Customer Resource management Domains Regulations Drones Google Apps Google Calendar Term IT Maintenance Microsoft Excel Electronic Medical Records Data Analysis IT Assessment Star Wars SharePoint Flexibility Gamification Refrigeration Value Business Intelligence Staff Halloween Writing Organization Public Speaking Social Networking Lenovo Shortcuts Legislation Ransmoware Virtual Reality Digital Security Cameras Fileless Malware Lithium-ion battery Smart Devices

Blog Archive