Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Mobile Device Ransomware Quick Tips Small Business Workplace Strategy Cybersecurity Microsoft Passwords Data Backup Communication Smartphone Saving Money Backup Business Management VoIP Smartphones Android Mobile Devices communications Upgrade Data Recovery Managed Service Browser Disaster Recovery Social Media Managed IT Services Microsoft Office Windows Remote Network Tech Term Internet of Things Current Events Productivity Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Miscellaneous Remote Work Gadgets Server Managed Service Provider Information Holiday Outsourced IT Encryption Employee/Employer Relationship Spam AI Windows 10 Government Office Training Compliance Data Management Business Continuity Virtualization Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Data Security Apps Two-factor Authentication Mobile Office Apple Networking Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Budget How To BDR Applications BYOD Computing Hacker Information Technology Conferencing Avoiding Downtime Access Control Marketing Office 365 Tip of the week WiFi Big Data HIPAA Managed IT Services Router Operating System Help Desk Computers Virtual Private Network Risk Management Website Health Healthcare Analytics Office Tips IT Support Augmented Reality Retail Storage Password Bring Your Own Device Solutions Social Going Green Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Customer Service Monitoring Vendor Management 2FA Cybercrime Excel Display Printer Remote Workers Paperless Office Telephone Infrastructure Firewall Document Management Cooperation Free Resource Project Management Windows 7 Microsoft 365 The Internet of Things Scam Data loss Administration Employees Integration User Tip Modem Mobile Security Robot Processor Customer Relationship Management Holidays Settings Printing Wireless Data Storage Content Filtering Smart Technology Supply Chain Hacking IT Management Presentation VPN Video Conferencing YouTube Meetings Managed Services Provider Physical Security Professional Services Saving Time Cryptocurrency Virtual Machines Wireless Technology Computer Repair Managed IT Service Virtual Desktop Data storage LiFi Downloads iPhone Word Licensing Outlook Machine Learning Vulnerabilities Entertainment Money Data Privacy Humor Images 101 Safety Telephone System Maintenance Multi-Factor Authentication Mobility Cost Management Sports Antivirus Mouse Assessment Electronic Health Records Permissions Workforce Directions Videos Mobile Computing Tablet Wasting Time Threats Search Specifications Security Cameras Workplace Strategies Application Best Practice Trend Micro Alert Internet Exlporer Software as a Service Buisness File Sharing Fraud Meta Dark Data Microchip Managed IT IBM Legal Username IT solutions Managing Costs Amazon How To Black Friday SSID Business Growth eCommerce Notifications Database Surveillance Travel Virtual Assistant Outsource IT Techology Google Maps IT Technicians Virtual Machine Environment Cortana Media Cyber Monday Medical IT Proxy Server Reviews Alt Codes Cookies Tactics Development Downtime Unified Threat Management Hotspot Transportation Small Businesses Competition Unified Threat Management Hosted Solution Mirgation Hypervisor Displays PowerPoint Shopping Typing Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Network Congestion Google Drive User Error Management PCI DSS User Chatbots Knowledge Navigation Distributed Denial of Service Workplace Gig Economy Screen Reader Service Level Agreement Internet Service Provider Point of Sale Computing Infrastructure Teamwork Hiring/Firing 5G IP Address Google Docs Regulations Compliance Unified Communications Identity Experience Evernote Paperless Running Cable Tech Support Co-managed IT Bookmark Bitcoin Network Management Smart Tech Memes Google Wallet Download Net Neutrality Alerts SQL Server Technology Care Monitors Financial Data Recovery History Business Communications Laptop Websites Break Fix Scams Browsers Smartwatch Hard Drives Windows 8 Connectivity IT Domains Drones Upload Procurement Azure Hybrid Work SharePoint Social Network Telework Cyber security Electronic Medical Records Multi-Factor Security Tech Human Resources Halloween Dark Web Cables CES Refrigeration IoT Communitications Public Speaking Lenovo Trends Supply Chain Management Writing Lithium-ion battery Customer Resource management FinTech Regulations Virtual Reality Google Calendar Term Google Apps Entrepreneur Scary Stories Private Cloud Microsoft Excel IT Maintenance Data Analysis Hacks Server Management Star Wars IT Assessment Superfish Gamification Flexibility Identity Theft Staff Value Business Intelligence Fun Organization Deep Learning Social Networking Twitter Legislation Shortcuts Smart Devices Error Ransmoware Fileless Malware Digital Security Cameras Undo Content Remote Working Education Wearable Technology Memory Vendors Social Engineering Comparison Google Play Be Proactive Health IT Motherboard Data Breach Remote Computing

Blog Archive