Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Passwords Quick Tips Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Vendor Mobile Office Two-factor Authentication Apps Data Security BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Managed Services Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking App Hacker Avoiding Downtime HIPAA Computing Marketing Applications Information Technology Access Control Office 365 Conferencing How To BDR Computers Operating System Website Router Virtual Private Network Risk Management Health Help Desk Analytics Office Tips Augmented Reality Retail Big Data Storage Password Healthcare Bring Your Own Device Managed IT Services 2FA Going Green Patch Management Save Money Microsoft 365 Excel Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Physical Security Display Printer Firewall Paperless Office Infrastructure Monitoring The Internet of Things Document Management Remote Workers Social Telephone Scam Data loss Cooperation Free Resource Windows 11 Project Management Windows 7 Customer Service Telephone System Multi-Factor Authentication Robot Mobility Presentation Cost Management Settings Wireless Technology Printing Wireless Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency Word User Tip Modem Computer Repair Mobile Security Processor Data Privacy Virtual Desktop Holidays LiFi Data storage Data Storage Smart Technology Video Conferencing Safety Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Humor Managed IT Service Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Customer Relationship Management Entertainment Administration Images 101 Supply Chain Hacking Organization Travel Social Networking Legislation Outsourcing Cortana User Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Workplace Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Hiring/Firing Permissions IP Address Paperless Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Co-managed IT Technology Care Trend Micro Network Congestion Specifications Security Cameras Internet Exlporer Software as a Service Knowledge Fraud Business Communications Recovery Google Drive User Error Microchip Username Managing Costs Scams Hard Drives 5G Black Friday SSID Hybrid Work Domains Point of Sale eCommerce Unified Communications Database Surveillance Experience Virtual Assistant Human Resources Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Cables Refrigeration Monitors Cyber Monday Medical IT Public Speaking Google Wallet Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Lithium-ion battery Google Apps Entrepreneur Windows 8 Laptop Websites Mirgation Hypervisor IT Maintenance PowerPoint Business Intelligence Drones Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Shortcuts SharePoint Management PCI DSS Halloween Chatbots Navigation Ransmoware Undo Writing Distributed Denial of Service Vendors Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Be Proactive Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Workforce Fun Threats Superfish Bookmark Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Twitter Alerts SQL Server Workplace Strategies Application Financial Data Error History Meta Social Engineering Break Fix Amazon IBM Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Outsource IT Search Dark Web Environment Media CES Tablet IoT Communitications Best Practice Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Small Businesses Competition How To Microsoft Excel Displays Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value

Blog Archive