Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security Internet Hardware Efficiency User Tips IT Support Malware Privacy Email Phishing Google Workplace Tips Computer Collaboration IT Services Users Mobile Device Hosted Solutions Ransomware Quick Tips Small Business Cybersecurity Microsoft Workplace Strategy Data Backup Communication Smartphone Saving Money VoIP Business Management Smartphones Android Passwords communications Mobile Devices Backup Data Recovery Managed IT Services Upgrade Managed Service Social Media Microsoft Office Disaster Recovery Browser Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Windows Server Managed Service Provider Remote Work Current Events Miscellaneous Gadgets Productivity Information Outsourced IT Holiday Employee/Employer Relationship Encryption Spam Windows 10 AI Office Business Continuity Data Management Government Compliance Training Business Technology Blockchain Bandwidth Windows 10 Virtualization Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Chrome Budget Vendor Mobile Device Management Apple Networking Gmail App Managed Services Voice over Internet Protocol Employer-Employee Relationship Access Control Hacker Office 365 Tip of the week Avoiding Downtime Marketing Applications How To BDR WiFi Conferencing BYOD Computing Information Technology Health Computers Office Tips Analytics Augmented Reality Website HIPAA Retail Storage Router Password Bring Your Own Device Managed IT Services Help Desk Big Data Operating System Healthcare Virtual Private Network Risk Management Cooperation Free Resource Paperless Office Customer Service Project Management Infrastructure Windows 7 IT Support Microsoft 365 Document Management Solutions Scam Data loss Firewall Windows 11 Monitoring 2FA Going Green Patch Management The Internet of Things Excel Save Money Remote Monitoring Vulnerability End of Support Social Vendor Management Cybercrime Remote Workers Telephone Display Printer Data Privacy Virtual Desktop Hacking Data storage LiFi Presentation Images 101 Telephone System Outlook Multi-Factor Authentication Mobility Machine Learning Wireless Technology Cost Management Money Humor Employees Maintenance Antivirus Integration Sports Word Mouse User Tip Modem Mobile Security Processor Administration Holidays Data Storage Safety Smart Technology Supply Chain Video Conferencing Robot Managed Services Provider Professional Services Settings Saving Time Virtual Machines Printing Wireless Content Filtering IT Management Managed IT Service VPN YouTube Meetings Physical Security Downloads Cryptocurrency iPhone Licensing Customer Relationship Management Computer Repair Vulnerabilities Entertainment Trends Supply Chain Management Google Wallet Monitors Customer Resource management FinTech Regulations Google Calendar Term Google Apps Windows 8 Microsoft Excel IT Maintenance Laptop Websites Data Analysis Star Wars IT Assessment Gamification Flexibility Drones Staff Value Business Intelligence User Electronic Medical Records Organization SharePoint Social Networking Legislation Shortcuts Ransmoware Halloween Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Lenovo Wearable Technology Memory Vendors IP Address Writing Virtual Reality Health IT Motherboard Data Breach Comparison Google Play Be Proactive Hacks Server Management Permissions Workforce Scary Stories Private Cloud Directions Videos Assessment Electronic Health Records Superfish Wasting Time Threats Identity Theft Fun Recovery Twitter Hard Drives Trend Micro Deep Learning Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Fraud Meta Error Domains Microchip Username Managing Costs Amazon Education Social Engineering Black Friday SSID Remote Computing Refrigeration eCommerce Database Surveillance Mobile Computing Virtual Assistant Outsource IT Public Speaking IT Technicians Virtual Machine Environment Tablet Lithium-ion battery Media Search Cyber Monday Medical IT Alert Entrepreneur Proxy Server Reviews Cookies Best Practice Tactics Development Managed IT Hotspot Transportation Small Businesses Buisness File Sharing Dark Data Legal Mirgation Hypervisor Displays IT solutions How To PowerPoint Notifications Undo Shopping Nanotechnology Optimization Business Growth Addiction Language Employer/Employee Relationships Outsourcing Travel Management PCI DSS Techology Chatbots Google Maps Navigation Cortana Distributed Denial of Service Workplace Gig Economy Screen Reader Alt Codes Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Downtime Unified Threat Management Application Regulations Compliance Unified Threat Management Identity Hosted Solution Evernote Paperless Typing Co-managed IT Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care IBM Network Congestion Knowledge Financial Data Google Drive User Error History Business Communications Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Point of Sale 5G Experience Social Network Telework Google Docs Cyber security Unified Communications Multi-Factor Security Tech Human Resources Bitcoin Network Management Dark Web Cables Running Cable Tech Support Competition CES IoT Communitications

Blog Archive