Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Artificial Intelligence Holiday Automation Information Facebook Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Bandwidth Blockchain Business Technology Windows 10 Data Security Apps Two-factor Authentication Mobile Office Vendor Networking Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Chrome Budget Mobile Device Management Apple Tip of the week Gmail App WiFi Computing How To Information Technology BDR Conferencing Office 365 Hacker Avoiding Downtime Marketing Access Control HIPAA Applications Operating System Big Data Managed IT Services Help Desk Risk Management 2FA Computers Analytics Office Tips Healthcare Augmented Reality Virtual Private Network Storage Website Password Bring Your Own Device Health Router Retail Scam Data loss Cybercrime Social Monitoring Patch Management Windows 11 Save Money Customer Service Remote Monitoring End of Support Vulnerability Remote Workers Vendor Management Excel Telephone Physical Security Display Cooperation Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Microsoft 365 Firewall Solutions Document Management Going Green The Internet of Things Processor Content Filtering Mobile Security Holidays YouTube Cryptocurrency Data Storage Smart Technology Video Conferencing Customer Relationship Management Managed Services Provider Virtual Machines Professional Services Saving Time Virtual Desktop Robot Data storage LiFi Managed IT Service Hacking Supply Chain Outlook Presentation Downloads IT Management iPhone VPN Money Meetings Humor Licensing Wireless Technology Vulnerabilities Entertainment Computer Repair Sports Images 101 Mouse Word Multi-Factor Authentication Mobility Telephone System Administration Cost Management Data Privacy Machine Learning Safety Employees Integration Maintenance Settings Modem Wireless Antivirus Printing User Tip Workforce Hosted Solution Social Engineering Database Surveillance Virtual Assistant Threats Typing Remote Computing IT Technicians Virtual Machine Cookies Cyber Monday Medical IT Application Workplace Strategies Proxy Server Reviews Meta Tactics Development Knowledge Hotspot Transportation Google Drive Tablet IBM Amazon Alert Mirgation Hypervisor Nanotechnology Optimization 5G PowerPoint Managed IT File Sharing Shopping Dark Data Outsource IT Unified Communications How To Addiction Experience Language Employer/Employee Relationships Google Docs Navigation Environment Bitcoin Notifications Media Management PCI DSS Running Cable Chatbots Screen Reader Distributed Denial of Service Google Wallet Travel Gig Economy Google Maps Small Businesses Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Techology Competition Evernote Displays Windows 8 Regulations Compliance Laptop Identity Smart Tech Memes Drones Unified Threat Management Bookmark Outsourcing Download Net Neutrality Alerts SQL Server Unified Threat Management User Financial Data Halloween History Network Congestion Connectivity IT Break Fix Workplace Browsers Smartwatch Hiring/Firing Upload Procurement Azure User Error IP Address Multi-Factor Security Tech Hacks Paperless Social Network Telework Scary Stories Cyber security IoT Communitications Fun Dark Web Point of Sale Co-managed IT CES Technology Care Deep Learning Trends Supply Chain Management Google Calendar Term Network Management Recovery Tech Support Business Communications Customer Resource management FinTech Regulations Data Analysis Education Monitors Star Wars IT Assessment Microsoft Excel Hard Drives Scams Hybrid Work Gamification Flexibility Staff Value Domains Social Networking Legislation Mobile Computing Websites Human Resources Organization Fileless Malware Digital Security Cameras Smart Devices Search Refrigeration Cables Best Practice Electronic Medical Records Content Remote Working Wearable Technology Memory SharePoint Public Speaking Motherboard Data Breach Lithium-ion battery Comparison Google Play Google Apps Health IT Buisness Directions Videos IT solutions Writing Assessment Electronic Health Records Permissions Lenovo Legal Entrepreneur IT Maintenance Business Intelligence Business Growth Virtual Reality Wasting Time Trend Micro Specifications Security Cameras Server Management Private Cloud Shortcuts Microchip Internet Exlporer Software as a Service Cortana Fraud Superfish Undo Identity Theft Ransmoware Vendors Alt Codes Twitter Username Managing Costs eCommerce Black Friday SSID Error Be Proactive Downtime

Blog Archive