Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

Even if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Phishing Google Workplace Tips Computer Collaboration IT Services Users Mobile Device Hosted Solutions Quick Tips Ransomware Microsoft Cybersecurity Small Business Workplace Strategy Communication Data Backup Smartphone Passwords Saving Money VoIP Android Business Management Smartphones communications Mobile Devices Backup Data Recovery Managed Service Upgrade Browser Managed IT Services Microsoft Office Social Media Disaster Recovery Windows Network Tech Term Internet of Things Remote Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Server Current Events Managed Service Provider Miscellaneous Gadgets Productivity Remote Work Holiday Information Outsourced IT Employee/Employer Relationship Encryption AI Spam Windows 10 Office Government Data Management Compliance Training Business Continuity Windows 10 Wi-Fi Virtualization Business Technology Blockchain Bandwidth Data Security Mobile Office Two-factor Authentication Apps Apple Networking App Mobile Device Management Managed Services Voice over Internet Protocol Gmail Employer-Employee Relationship Chrome Budget Vendor Avoiding Downtime How To BDR Marketing Conferencing BYOD Computing Information Technology WiFi Access Control Office 365 Tip of the week Applications Hacker Managed IT Services Website Help Desk Operating System Healthcare Virtual Private Network Risk Management Health Big Data Office Tips Analytics Augmented Reality HIPAA Retail Router Storage Password Computers Bring Your Own Device Windows 11 Monitoring 2FA Going Green Patch Management Save Money Excel Remote Monitoring Vulnerability End of Support Vendor Management Firewall Cybercrime Remote Workers Telephone Display The Internet of Things Printer Cooperation Free Resource Paperless Office Project Management Infrastructure Social Windows 7 IT Support Microsoft 365 Document Management Solutions Customer Service Scam Data loss Mobile Security Processor Wireless Technology Administration Holidays Data Storage Smart Technology Supply Chain Robot Video Conferencing Managed Services Provider Word Settings Saving Time Virtual Machines Professional Services Printing Wireless Content Filtering IT Management Managed IT Service VPN YouTube Meetings Physical Security Downloads Cryptocurrency Safety iPhone Licensing Computer Repair Entertainment Vulnerabilities Data Privacy Virtual Desktop Data storage LiFi Images 101 Telephone System Multi-Factor Authentication Outlook Mobility Machine Learning Cost Management Money Customer Relationship Management Humor Employees Maintenance Integration Hacking Antivirus Sports Presentation Mouse User Tip Modem Virtual Assistant Outsource IT Mobile Computing Database Surveillance IT Technicians Virtual Machine Environment Media Tablet Search Best Practice Alert Proxy Server Reviews Cookies IP Address Cyber Monday Medical IT Hotspot Transportation Small Businesses Managed IT Buisness File Sharing Dark Data Tactics Development How To Mirgation Hypervisor Displays Legal IT solutions Recovery Business Growth Notifications Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Hard Drives Travel Addiction Cortana Management PCI DSS Chatbots Domains Techology Navigation Google Maps Alt Codes Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Refrigeration Downtime Unified Threat Management Service Level Agreement Internet Service Provider Regulations Compliance Identity Public Speaking Unified Threat Management Evernote Paperless Hosted Solution Typing Bookmark Smart Tech Memes Lithium-ion battery Co-managed IT Alerts SQL Server Technology Care Entrepreneur Network Congestion Download Net Neutrality Knowledge Financial Data History Google Drive User Error Business Communications Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Undo Point of Sale 5G Upload Procurement Experience Social Network Telework Cyber security Google Docs Multi-Factor Security Tech Human Resources Unified Communications Bitcoin Network Management Running Cable Tech Support CES IoT Communitications Dark Web Cables Google Wallet Monitors Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Application Windows 8 Laptop Websites Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Drones Gamification Flexibility Electronic Medical Records Organization Social Networking IBM SharePoint Legislation Shortcuts Halloween Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Lenovo Writing Content Remote Working Virtual Reality Health IT Motherboard Data Breach Comparison Google Play Be Proactive Hacks Server Management Scary Stories Private Cloud Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Competition Superfish Identity Theft Fun Twitter Trend Micro Specifications Security Cameras Workplace Strategies Deep Learning Fraud Meta Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Education Social Engineering Remote Computing eCommerce Black Friday SSID User

Blog Archive