Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Prefer Your Reality Augmented, or Virtual?

Do You Prefer Your Reality Augmented, or Virtual?

At the International Consumer Electronics Show (CES), new products (and the technologies that fuel those products) are put on display to give industry professionals a look to see what companies are working on. At CES 2018, held in Las Vegas, Band and Olufsen introduced their speakers-as-art-concept, Samsung unveiled a 146” television that is designed to take up a wall, and many companies, including Aura, introduced new smart home security products that are sure to get an intruder’s attention (over Wi-Fi).

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Phishing Workplace Tips Hosted Solutions IT Services Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Backup Passwords Communication Data Backup Saving Money Smartphone Android Managed Service Smartphones VoIP Business Management Mobile Devices communications Upgrade Disaster Recovery Data Recovery Social Media Productivity Browser Windows Microsoft Office Managed IT Services Current Events AI Remote Tech Term Network Internet of Things Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Information Remote Work Training Server Managed Service Provider Miscellaneous Outsourced IT Spam Employee/Employer Relationship Compliance Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology IT Support Bandwidth Windows 10 Virtualization Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Managed Services Chrome Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Tip of the week Conferencing How To WiFi BDR Operating System Router Virtual Private Network Risk Management Computers Help Desk Health Analytics Website Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Physical Security Customer Service Display Printer Windows 11 Monitoring Paperless Office 2FA Infrastructure Excel Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management The Internet of Things Windows 7 Microsoft 365 Going Green Patch Management Social Save Money Settings Printing Wireless Employees Content Filtering Integration IT Management Customer Relationship Management VPN YouTube Meetings User Tip Modem Mobile Security Processor Cryptocurrency Hacking Holidays Presentation Computer Repair Data Storage Virtual Desktop Data storage LiFi Wireless Technology Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Outlook Virtual Machines Professional Services Machine Learning Money Word Humor Managed IT Service Downloads Maintenance iPhone Licensing Sports Antivirus Mouse Entertainment Vulnerabilities Safety Data Privacy Administration Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Robot Permissions Workforce Directions Videos Assessment Electronic Health Records Alt Codes IBM Wasting Time Threats Downtime Unified Threat Management Unified Threat Management Trend Micro Hosted Solution Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Internet Exlporer Software as a Service Typing Username Managing Costs Amazon Network Congestion Google Drive User Error eCommerce Competition Black Friday SSID Knowledge Virtual Assistant Outsource IT Database Surveillance IT Technicians Virtual Machine Environment Point of Sale Media 5G Proxy Server Reviews Google Docs Cookies Unified Communications Cyber Monday Medical IT Experience Hotspot Transportation Small Businesses Running Cable Tech Support User Tactics Development Bitcoin Network Management Google Wallet Mirgation Hypervisor Displays Monitors Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Laptop Websites Addiction Windows 8 IP Address Management PCI DSS Drones Chatbots Navigation Gig Economy SharePoint Screen Reader Distributed Denial of Service Workplace Electronic Medical Records Computing Infrastructure Teamwork Hiring/Firing Halloween Recovery Service Level Agreement Internet Service Provider Regulations Compliance Lenovo Identity Hard Drives Evernote Paperless Writing Bookmark Smart Tech Memes Domains Co-managed IT Virtual Reality Alerts SQL Server Technology Care Scary Stories Private Cloud Download Net Neutrality Hacks Server Management Financial Data Superfish History Identity Theft Refrigeration Business Communications Fun Browsers Smartwatch Connectivity IT Deep Learning Public Speaking Break Fix Scams Twitter Lithium-ion battery Azure Hybrid Work Error Upload Procurement Social Network Telework Cyber security Education Multi-Factor Security Tech Human Resources Social Engineering Entrepreneur CES IoT Communitications Dark Web Cables Remote Computing Mobile Computing Trends Supply Chain Management Customer Resource management FinTech Regulations Tablet Undo Google Calendar Term Google Apps Search Alert Data Analysis Star Wars IT Assessment Best Practice Microsoft Excel IT Maintenance Managed IT Staff Value Business Intelligence Buisness File Sharing Dark Data Gamification Flexibility Organization Legal Social Networking IT solutions Legislation Shortcuts How To Notifications Fileless Malware Digital Security Cameras Smart Devices Business Growth Ransmoware Content Remote Working Wearable Technology Memory Vendors Travel Application Health IT Techology Motherboard Data Breach Google Maps Comparison Google Play Be Proactive Cortana

Blog Archive