Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Are Great, Until They Are Not

Smartphones Are Great, Until They Are Not

Smartphones are a helpful tool by any measure. Still, with these devices' widespread use, serious concerns about how they may contribute to certain negative human situations have arisen. Here are some ways smartphones can be seen as having a negative effect on people and society. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Mobile Device Ransomware Quick Tips Cybersecurity Workplace Strategy Microsoft Small Business Data Backup Passwords Communication Smartphone Saving Money Backup Android VoIP Business Management Smartphones Mobile Devices communications Upgrade Managed Service Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Productivity Automation Artificial Intelligence Facebook Current Events Covid-19 Cloud Computing Remote Work Server Managed Service Provider Miscellaneous Gadgets Information Holiday Outsourced IT Employee/Employer Relationship Encryption AI Spam Windows 10 Training Office Business Continuity Data Management Compliance Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Two-factor Authentication Mobile Office Data Security Apps Vendor Chrome Mobile Device Management Budget Managed Services Voice over Internet Protocol Gmail Apple Networking App Employer-Employee Relationship Computing Information Technology Applications Hacker Access Control Avoiding Downtime Office 365 Marketing Tip of the week Conferencing How To WiFi BDR BYOD HIPAA Router Risk Management Virtual Private Network Computers Health Analytics Website Office Tips Help Desk IT Support Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Managed IT Services Big Data Operating System Solutions Customer Service Display Printer Paperless Office Infrastructure Windows 11 Monitoring 2FA Document Management Excel Firewall Remote Workers Scam Telephone Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Vendor Management Cybercrime YouTube Meetings VPN Physical Security Employees Cryptocurrency Integration Hacking Presentation Computer Repair User Tip Modem Mobile Security Virtual Desktop Processor Data storage LiFi Wireless Technology Holidays Data Storage Outlook Smart Technology Supply Chain Machine Learning Money Video Conferencing Humor Managed Services Provider Word Saving Time Virtual Machines Professional Services Maintenance Sports Antivirus Managed IT Service Mouse Downloads iPhone Safety Licensing Administration Vulnerabilities Entertainment Data Privacy Robot Images 101 Telephone System Multi-Factor Authentication Mobility Settings Wireless Cost Management Printing Content Filtering IT Management Customer Relationship Management Permissions Workforce Network Congestion Directions Videos Assessment Electronic Health Records Google Drive User Error Wasting Time Threats Competition Knowledge Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Point of Sale 5G Microchip Internet Exlporer Software as a Service Username Google Docs Managing Costs Amazon Unified Communications Experience User eCommerce Bitcoin Network Management Black Friday SSID Running Cable Tech Support Virtual Assistant Outsource IT Monitors Database Surveillance Google Wallet IT Technicians Virtual Machine Environment Media Proxy Server Reviews Cookies Windows 8 IP Address Cyber Monday Medical IT Laptop Websites Hotspot Transportation Small Businesses Tactics Development Drones SharePoint Mirgation Hypervisor Displays Electronic Medical Records Recovery Shopping Nanotechnology Optimization PowerPoint Halloween Lenovo Language Employer/Employee Relationships Outsourcing Hard Drives Writing Addiction Management PCI DSS Chatbots Domains Navigation Virtual Reality Scary Stories Private Cloud Gig Economy Screen Reader Hacks Server Management Distributed Denial of Service Workplace Superfish Computing Infrastructure Teamwork Hiring/Firing Identity Theft Refrigeration Fun Service Level Agreement Internet Service Provider Regulations Compliance Identity Deep Learning Public Speaking Evernote Paperless Twitter Error Bookmark Smart Tech Memes Lithium-ion battery Co-managed IT Download Net Neutrality Alerts SQL Server Technology Care Education Social Engineering Entrepreneur Financial Data History Business Communications Remote Computing Break Fix Scams Browsers Smartwatch Connectivity IT Mobile Computing Upload Procurement Azure Hybrid Work Tablet Undo Search Social Network Telework Cyber security Best Practice Multi-Factor Security Tech Human Resources Alert Dark Web Cables Buisness File Sharing Dark Data CES IoT Communitications Managed IT Trends Supply Chain Management Legal IT solutions How To Customer Resource management FinTech Regulations Business Growth Google Calendar Term Google Apps Notifications Microsoft Excel IT Maintenance Travel Application Data Analysis Star Wars IT Assessment Gamification Flexibility Techology Staff Value Business Intelligence Google Maps Cortana Organization Social Networking Alt Codes IBM Legislation Shortcuts Ransmoware Downtime Unified Threat Management Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Unified Threat Management Wearable Technology Memory Vendors Hosted Solution Health IT Motherboard Data Breach Typing Comparison Google Play Be Proactive

Blog Archive