Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Prefer Your Reality Augmented, or Virtual?

Do You Prefer Your Reality Augmented, or Virtual?

At the International Consumer Electronics Show (CES), new products (and the technologies that fuel those products) are put on display to give industry professionals a look to see what companies are working on. At CES 2018, held in Las Vegas, Band and Olufsen introduced their speakers-as-art-concept, Samsung unveiled a 146” television that is designed to take up a wall, and many companies, including Aura, introduced new smart home security products that are sure to get an intruder’s attention (over Wi-Fi).

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Computer Phishing Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Communication Passwords Data Backup Smartphone Saving Money Backup Managed Service VoIP Business Management Smartphones Android communications Mobile Devices Upgrade Disaster Recovery Browser Data Recovery Managed IT Services Social Media Windows Microsoft Office Current Events Network Remote Tech Term Productivity Internet of Things Facebook Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing AI Remote Work Miscellaneous Server Managed Service Provider Holiday Information Outsourced IT Training Encryption Employee/Employer Relationship Spam Compliance Windows 10 Office Data Management Business Continuity Government Virtualization Business Technology Wi-Fi Bandwidth Blockchain Windows 10 Vendor Apps Two-factor Authentication IT Support Data Security Mobile Office Gmail App Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Chrome Budget Mobile Device Management BYOD Apple HIPAA Access Control WiFi Applications Tip of the week Computing Information Technology Conferencing Hacker Office 365 How To Avoiding Downtime BDR Marketing Virtual Private Network Router Health Big Data Operating System Retail Help Desk Risk Management Computers Managed IT Services Healthcare Analytics Office Tips Augmented Reality Website Storage Password Bring Your Own Device Solutions Display Printer Paperless Office Going Green Windows 11 The Internet of Things Infrastructure 2FA Social Cybercrime Excel Document Management Monitoring Scam Customer Service Remote Workers Data loss Telephone Free Resource Patch Management Project Management Save Money Windows 7 Cooperation Remote Monitoring End of Support Vulnerability Vendor Management Microsoft 365 Firewall Physical Security Safety Employees Computer Repair Integration Settings Wireless User Tip Printing Modem Supply Chain Mobile Security Content Filtering Holidays Processor Machine Learning Data Storage YouTube Cryptocurrency Video Conferencing Smart Technology Managed Services Provider Customer Relationship Management Maintenance Virtual Machines Professional Services Antivirus Saving Time Virtual Desktop LiFi Hacking Data storage Presentation Managed IT Service iPhone Data Privacy Outlook Wireless Technology Downloads Money Humor Vulnerabilities Licensing Robot Entertainment Images 101 Word Sports Multi-Factor Authentication Mouse Mobility IT Management Meetings Telephone System VPN Administration Cost Management Content Best Practice Amazon Wearable Technology Videos Entrepreneur Electronic Health Records Point of Sale Wasting Time Health IT Motherboard Buisness Comparison IT solutions Outsource IT Permissions Trend Micro Directions Legal Security Cameras Assessment Business Growth Environment Media Undo Network Management Software as a Service Tech Support Managing Costs Monitors Specifications Internet Exlporer Small Businesses Fraud Cortana eCommerce Microchip SSID Virtual Assistant Username Alt Codes Displays Surveillance Websites Black Friday Virtual Machine Downtime Database Hosted Solution Outsourcing SharePoint Application Reviews Electronic Medical Records Medical IT Transportation Typing IT Technicians Development Lenovo Cyber Monday Hypervisor Writing Proxy Server Cookies Workplace IBM Tactics Hiring/Firing Hotspot Knowledge Shopping Optimization Virtual Reality Google Drive PowerPoint Private Cloud Employer/Employee Relationships Mirgation Paperless Server Management Superfish 5G PCI DSS Identity Theft Navigation Nanotechnology Co-managed IT Addiction Unified Communications Technology Care Language Experience Gig Economy Twitter Google Docs Internet Service Provider Error Teamwork Management Bitcoin Chatbots Running Cable Business Communications Competition Distributed Denial of Service Regulations Compliance Social Engineering Google Wallet Evernote Screen Reader Scams Service Level Agreement Hybrid Work Computing Infrastructure Memes Remote Computing Net Neutrality SQL Server Windows 8 Identity Laptop Human Resources User Financial Data Tablet History Bookmark Drones Smart Tech Cables Download Alerts Smartwatch IT Alert Procurement File Sharing Azure Dark Data Halloween Google Apps Managed IT IT Maintenance IP Address Break Fix Telework Cyber security How To Browsers Tech Connectivity Upload Business Intelligence CES Communitications Notifications Supply Chain Management Travel Social Network Hacks Scary Stories Shortcuts Multi-Factor Security Ransmoware Techology Dark Web Fun Recovery FinTech Google Maps Term IoT Trends Deep Learning Vendors Hard Drives IT Assessment Flexibility Unified Threat Management Value Customer Resource management Regulations Be Proactive Domains Google Calendar Education Workforce Unified Threat Management Microsoft Excel Organization Data Analysis Star Wars Gamification Threats Staff Refrigeration Digital Security Cameras Smart Devices Remote Working Memory Network Congestion Mobile Computing Social Networking Workplace Strategies Public Speaking Legislation Meta Lithium-ion battery User Error Search Data Breach Fileless Malware Google Play

Blog Archive