Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Artificial Intelligence Provide Artificial Hope?

Does Artificial Intelligence Provide Artificial Hope?

Typically, we use this space to talk about technology-related issues that have a positive impact on business, society, and individuals. Information technology has and will continue to transform the world we live in. One of the central topics of this giant IT transformation is artificial intelligence (AI) and where it fits into the paradigm of modernity.  Much has been made about the potential benefits of AI—and many of them are legitimate—but in today’s blog, we wanted to discuss the dark side of AI, and whether or not immediate regulation of the technology is a prudent decision.

Continue reading

Should Cryptocurrency Be Taxed?

Should Cryptocurrency Be Taxed?

If you are a frequent reader of this blog, you’ve seen articles about blockchain before. This week we thought we’d go a different direction and take a look at the question of whether or not cryptocurrency, a construct made possible by blockchain technology, should be made taxable by state, federal, and international lawmakers. Let’s take a look at blockchain, its role in cryptocurrency, and whether or not taxation is on the agenda down the road.

Continue reading

We Should Talk About the “Act Your Wage” Trend

We Should Talk About the “Act Your Wage” Trend

Numerous workplace trends have emerged in the past few years, many of which employers are not fond of. “Quiet quitting” is an example of such a trend, where workers will do the bare minimum—nothing more—to retain their employment. More recently, the trend has been to “act your wage.”

Let’s look at what this means and how to handle it if you ever encounter it in your business.

Continue reading
0 Comments

Explaining Google’s Back-end Operations

Explaining Google’s Back-end Operations

Billions of people who find themselves on the Internet depend on the use of Google Search to find what they are looking for. What actually happens when you click on the “search,” though? Today, we want to discuss how the search engine works so you can get a better idea of what goes on behind the scenes.

Continue reading
0 Comments

The Department of Homeland Security will Use AI, Here’s How?

The Department of Homeland Security will Use AI, Here’s How?

With artificial intelligence becoming a household conversation starter across the country, it’s no wonder the technology has become a key part of operations for countless entities. It’s used in business, education, civic life, and elsewhere… including the U.S. Department of Homeland Security. How is the US DHS using AI to promote the security of everyday Americans?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Google Privacy Email Phishing Workplace Tips Computer Hosted Solutions Users Collaboration IT Services Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Data Backup Communication Smartphone Backup Saving Money Business Management Android Smartphones VoIP communications Mobile Devices Upgrade Managed Service Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Facebook Automation Productivity Artificial Intelligence Current Events Cloud Computing Gadgets Covid-19 Miscellaneous Remote Work Server Managed Service Provider Information Holiday AI Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Compliance Training Business Continuity Data Management Government Wi-Fi Virtualization Business Technology Bandwidth Windows 10 Blockchain Two-factor Authentication Apps Mobile Office Data Security BYOD Vendor Employer-Employee Relationship Chrome Budget Managed Services Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail WiFi Computing Applications Information Technology Access Control Office 365 IT Support Tip of the week Hacker Conferencing Avoiding Downtime Marketing How To BDR Operating System HIPAA Router Big Data Virtual Private Network Risk Management Health Help Desk Office Tips Analytics Computers Augmented Reality Retail Storage Password Website Bring Your Own Device Managed IT Services Healthcare Windows 7 Vendor Management The Internet of Things Cybercrime Microsoft 365 Physical Security Social Display Solutions Printer Paperless Office Infrastructure Monitoring Customer Service Windows 11 Document Management 2FA Telephone Excel Scam Data loss Remote Workers Cooperation Firewall Going Green Patch Management Save Money Free Resource Remote Monitoring Vulnerability End of Support Project Management Images 101 Content Filtering IT Management VPN YouTube Meetings Multi-Factor Authentication Mobility Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Employees Customer Relationship Management Integration Data storage LiFi Smart Technology Outlook Machine Learning Hacking Money Saving Time Holidays Presentation Humor Data Storage Supply Chain Managed IT Service Wireless Technology Video Conferencing Maintenance Antivirus Sports Downloads Managed Services Provider Professional Services Mouse Virtual Machines Licensing Word Entertainment Administration iPhone Telephone System Robot Vulnerabilities Cost Management Settings Safety Data Privacy Printing Wireless IT Maintenance Unified Threat Management Directions Hosted Solution Assessment Permissions IT Assessment Flexibility Value Business Intelligence Typing Organization Network Congestion Specifications Shortcuts Ransmoware Google Drive User Error Microchip Internet Exlporer Digital Security Cameras Knowledge Fraud Smart Devices Remote Working Memory Vendors Application Username Point of Sale 5G Black Friday Data Breach Google Play Be Proactive Electronic Health Records IBM Workforce Google Docs Unified Communications Database Videos Experience Running Cable Tech Support IT Technicians Wasting Time Threats Bitcoin Network Management Security Cameras Workplace Strategies Google Wallet Proxy Server Cookies Monitors Cyber Monday Trend Micro Software as a Service Meta Tactics Hotspot Windows 8 Laptop Websites Mirgation Managing Costs Amazon SSID Drones Nanotechnology eCommerce Competition Electronic Medical Records Language Surveillance Virtual Assistant Outsource IT SharePoint Addiction Management Halloween Chatbots Virtual Machine Environment Media Medical IT Lenovo Screen Reader Reviews Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Development Transportation Small Businesses User Service Level Agreement Hacks Server Management Scary Stories Private Cloud Identity Hypervisor Displays PowerPoint Superfish Bookmark Identity Theft Smart Tech Shopping Fun Optimization Twitter Alerts IP Address Employer/Employee Relationships Outsourcing Deep Learning Download Error PCI DSS Navigation Workplace Browsers Education Connectivity Gig Economy Social Engineering Break Fix Remote Computing Internet Service Provider Teamwork Hiring/Firing Recovery Upload Mobile Computing Social Network Regulations Compliance Multi-Factor Security Hard Drives Evernote Paperless Co-managed IT Tablet IoT Search Dark Web Memes Domains Alert Net Neutrality SQL Server Technology Care Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Financial Data Dark Data Google Calendar History Refrigeration Business Communications Scams Legal Data Analysis IT solutions Star Wars Smartwatch How To Microsoft Excel IT Public Speaking Notifications Staff Procurement Lithium-ion battery Azure Hybrid Work Business Growth Gamification Travel Social Networking Telework Legislation Cyber security Tech Human Resources Entrepreneur Cables Techology Fileless Malware Google Maps CES Cortana Communitications Wearable Technology Supply Chain Management Alt Codes Content Health IT Downtime Unified Threat Management Motherboard FinTech Comparison Undo Term Google Apps

Blog Archive