Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Google Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Artificial Intelligence Information Miscellaneous Holiday Automation Cloud Computing Gadgets Training Covid-19 Managed Service Provider Compliance Remote Work Server Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain Virtualization Bandwidth Business Technology Wi-Fi Two-factor Authentication Data Security Vendor Apps Mobile Office Mobile Device Management Managed Services Voice over Internet Protocol Networking Gmail Chrome WiFi Budget BYOD Employer-Employee Relationship Apple App Tip of the week Information Technology How To Office 365 BDR HIPAA Applications Access Control Hacker Conferencing Avoiding Downtime Computing Marketing Risk Management Managed IT Services Healthcare Analytics Office Tips Augmented Reality Big Data Router Storage Password Bring Your Own Device Virtual Private Network Help Desk Health Computers Operating System 2FA Website Retail Excel Scam Data loss Cooperation Firewall Remote Workers The Internet of Things Patch Management Save Money Remote Monitoring Free Resource Vulnerability Project Management End of Support Vendor Management Windows 7 Social Physical Security Microsoft 365 Display Solutions Printer Customer Service Paperless Office Monitoring Infrastructure Going Green Windows 11 Document Management Cybercrime Telephone Maintenance Video Conferencing Cryptocurrency Licensing Word Antivirus Managed Services Provider Virtual Machines Professional Services Entertainment Virtual Desktop Data storage LiFi Telephone System iPhone Safety Outlook Cost Management Money Robot Vulnerabilities Humor Data Privacy Images 101 IT Management Sports Mobility Mouse VPN Meetings Multi-Factor Authentication User Tip Modem Processor Mobile Security Customer Relationship Management Administration Computer Repair Employees Integration Hacking Smart Technology Presentation Settings Saving Time Printing Machine Learning Wireless Wireless Technology Content Filtering Holidays Managed IT Service YouTube Data Storage Supply Chain Downloads Browsers Twitter Employer/Employee Relationships Outsourcing Connectivity Hard Drives Break Fix PCI DSS Error 5G Upload Navigation Domains Social Network Social Engineering Workplace Google Docs Multi-Factor Security Unified Communications Gig Economy Experience Running Cable Internet Service Provider Remote Computing Teamwork Hiring/Firing IoT Refrigeration Dark Web Bitcoin Evernote Paperless Public Speaking Google Wallet Regulations Compliance Trends Memes Customer Resource management Co-managed IT Lithium-ion battery Regulations Google Calendar Tablet Entrepreneur Laptop Net Neutrality Data Analysis Alert SQL Server Technology Care Star Wars Microsoft Excel Windows 8 Business Communications Staff Drones Managed IT Financial Data File Sharing History Gamification Dark Data IT How To Scams Social Networking Legislation Smartwatch Halloween Procurement Fileless Malware Notifications Azure Hybrid Work Undo Tech Human Resources Wearable Technology Telework Travel Cyber security Content Communitications Health IT Cables Motherboard Comparison Techology CES Google Maps Hacks Scary Stories Supply Chain Management Directions Assessment Permissions Term Google Apps FinTech Unified Threat Management Fun IT Assessment IT Maintenance Application Specifications Unified Threat Management Deep Learning Flexibility Microchip Value Business Intelligence Internet Exlporer Fraud Shortcuts IBM Education Organization Username Network Congestion Smart Devices Ransmoware Black Friday User Error Digital Security Cameras Mobile Computing Remote Working Memory Vendors Database Google Play Be Proactive IT Technicians Point of Sale Search Data Breach Electronic Health Records Proxy Server Workforce Cookies Cyber Monday Best Practice Videos Network Management Buisness Tech Support Wasting Time Threats Tactics Competition Hotspot Security Cameras Workplace Strategies Mirgation Legal IT solutions Trend Micro Monitors Software as a Service Meta Nanotechnology Business Growth Websites Managing Costs Amazon Addiction Language SSID Chatbots User Cortana eCommerce Management Surveillance Electronic Medical Records Virtual Assistant Outsource IT Screen Reader Distributed Denial of Service SharePoint Alt Codes Downtime Virtual Machine Environment Service Level Agreement Media Computing Infrastructure Writing Medical IT IP Address Identity Lenovo Hosted Solution Reviews Development Bookmark Virtual Reality Transportation Small Businesses Smart Tech Typing Alerts Server Management Private Cloud Hypervisor Displays Download PowerPoint Google Drive Recovery Superfish Shopping Identity Theft Knowledge Optimization

Blog Archive