Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Backup Small Business Hosted Solutions Collaboration Users Ransomware AI Managed Service Mobile Device Productivity Saving Money Microsoft Passwords Quick Tips Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Miscellaneous Automation Facebook Artificial Intelligence Holiday Training Compliance Covid-19 Gadgets Cloud Computing Outsourced IT Remote Work IT Support Server Managed Service Provider Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Wi-Fi Blockchain Virtualization Vendor Bandwidth Two-factor Authentication Apps Data Security Managed Services Mobile Office Mobile Device Management Gmail Tip of the week WiFi Employer-Employee Relationship Networking Chrome Budget BYOD Apple Voice over Internet Protocol App Access Control Computing Information Technology HIPAA Applications Office 365 Managed IT Services How To BDR Password Hacker Avoiding Downtime Conferencing Marketing Physical Security Health Operating System Risk Management Retail Big Data Router Analytics Office Tips Augmented Reality Help Desk 2FA Computers Storage Bring Your Own Device Website Virtual Private Network Healthcare Going Green Printer Cooperation Firewall Paperless Office Infrastructure Free Resource Project Management Cybercrime Windows 7 The Internet of Things Document Management Microsoft 365 Social Solutions Scam Data loss Monitoring Customer Service Windows 11 Patch Management Save Money Remote Monitoring End of Support Vulnerability Excel Vendor Management Managed IT Service Remote Workers Telephone Display Computer Repair iPhone Entertainment Settings Printing Vulnerabilities Wireless Data Privacy Content Filtering Images 101 Telephone System YouTube Safety Cost Management Machine Learning Cryptocurrency Multi-Factor Authentication Mobility Maintenance Virtual Desktop LiFi Antivirus Data storage Employees User Tip Modem Integration Mobile Security Outlook Processor Customer Relationship Management Money Humor Holidays Smart Technology Hacking Data Storage Presentation Robot Sports Supply Chain Mouse Saving Time Video Conferencing Managed Services Provider Wireless Technology Virtual Machines Professional Services IT Management Administration VPN Meetings Downloads Licensing Word Smartwatch Social Network IT Scams Multi-Factor Security Azure Hybrid Work Cortana Dark Web Refrigeration Network Management Tech Support Procurement IoT Monitors Telework Alt Codes Trends Cyber security Public Speaking Tech Human Resources CES Customer Resource management Communitications Downtime Regulations Lithium-ion battery Cables Google Calendar Microsoft Excel Entrepreneur Websites Data Analysis Supply Chain Management Hosted Solution Star Wars FinTech Typing Gamification Staff Term Google Apps Electronic Medical Records IT Assessment Social Networking SharePoint IT Maintenance Legislation Value Business Intelligence Knowledge Undo Google Drive Fileless Malware Flexibility Writing Organization Content Wearable Technology Lenovo Shortcuts 5G Comparison Virtual Reality Digital Security Cameras Health IT Smart Devices Motherboard Ransmoware Unified Communications Assessment Memory Vendors Experience Permissions Server Management Private Cloud Google Docs Directions Remote Working Bitcoin Data Breach Running Cable Superfish Google Play Be Proactive Identity Theft Specifications Application Twitter Videos Google Wallet Electronic Health Records Workforce Internet Exlporer Wasting Time Threats Fraud Error Microchip Social Engineering Windows 8 Username Trend Micro Laptop IBM Security Cameras Workplace Strategies Black Friday Remote Computing Drones Software as a Service Meta Database Managing Costs Amazon eCommerce Halloween IT Technicians SSID Tablet Cyber Monday Alert Proxy Server Surveillance Cookies Virtual Assistant Outsource IT Tactics Virtual Machine Environment Hotspot Competition Managed IT Media File Sharing Dark Data How To Reviews Hacks Scary Stories Mirgation Medical IT Transportation Small Businesses Fun Notifications Development Nanotechnology Deep Learning Addiction Hypervisor Displays Language Travel User Google Maps Shopping Management Optimization Chatbots Techology PowerPoint Employer/Employee Relationships Outsourcing Distributed Denial of Service Education Screen Reader PCI DSS Service Level Agreement Computing Infrastructure Navigation Unified Threat Management Gig Economy Mobile Computing Identity IP Address Unified Threat Management Workplace Teamwork Hiring/Firing Search Bookmark Internet Service Provider Smart Tech Network Congestion Regulations Compliance Best Practice Download Alerts Evernote Paperless Recovery Memes Buisness User Error Co-managed IT SQL Server Technology Care Break Fix Hard Drives Legal Browsers Net Neutrality IT solutions Connectivity Financial Data Business Growth Upload History Domains Business Communications Point of Sale

Blog Archive