Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

House of Representatives Makes Moves to Support Small Business

House of Representatives Makes Moves to Support Small Business

Without competition, there would not be businesses. However, this competition needs to be fair in order for small businesses to embrace new opportunities that arise. A U.S. bill that allows for both of these goals has passed in the House of Representatives and will be voted on in the Senate.

Bill 2763, or the Small Business Innovation Research and Small Business Technology Transfer Improvements Act, establishes the requirement for the Small Business Administration to provide Congress with reports of their programs as well as mandates that the Department of Defense utilize more technology from small businesses.

Authored by Steve Knight, representative of California’s 25th congressional district, the bill “would give the opportunity for America’s small businesses to participate in the national security needs for innovation in our country,” as Knight put it. Knight also said that programs like these improve safety and economic stability.

Representative Lamar Smith, chairman of the House Science, Space and Technology Committee, voiced his support in a statement of his own.

“The SBIR [Small Business Innovation Research] and STTR [Small Business Technology Transfer] programs, through their $3 billion in annual awards to small businesses, spur many innovations and create thousands of jobs,” Smith said. “This legislation updates these crucial programs.”

Knight seems to agree.

“These programs sponsor developments that allow us to compete in the international marketplace and provide innovative tools supported and created by local entrepreneurs that contribute to American security.”

At Voyage Technology, we feel the same way about what we do for businesses like yours. For help implementing the tools you need for success, reach out at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Ransomware Users AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Cloud Computing Training Covid-19 Compliance Gadgets Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Vendor Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Managed Services Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking Voice over Internet Protocol App Employer-Employee Relationship HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Password Managed IT Services How To BDR Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality 2FA Retail Storage Bring Your Own Device Big Data Healthcare Free Resource Remote Monitoring Project Management End of Support Vulnerability Customer Service Vendor Management Windows 7 Cybercrime Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Monitoring Firewall Document Management Windows 11 Managed IT Service Excel Telephone The Internet of Things Scam Data loss Remote Workers Social Cooperation Going Green Patch Management Save Money Data Privacy Settings Wireless Printing Images 101 Content Filtering Hacking IT Management YouTube Meetings Multi-Factor Authentication Mobility Presentation VPN Cryptocurrency User Tip Modem Wireless Technology Processor Computer Repair Mobile Security Employees Virtual Desktop Data storage LiFi Integration Word Smart Technology Outlook Machine Learning Money Saving Time Holidays Humor Data Storage Supply Chain Safety Maintenance Video Conferencing Sports Managed Services Provider Downloads Antivirus Mouse Virtual Machines Professional Services Licensing Entertainment Administration iPhone Robot Telephone System Customer Relationship Management Cost Management Vulnerabilities Alt Codes Content Supply Chain Management Wearable Technology FinTech Downtime Unified Threat Management Motherboard Comparison Term Google Apps Competition Health IT Unified Threat Management Directions Hosted Solution Assessment IT Assessment Permissions IT Maintenance Value Business Intelligence Typing Flexibility Organization Network Congestion Specifications Shortcuts Google Drive User Error Microchip Digital Security Cameras User Internet Exlporer Smart Devices Knowledge Fraud Ransmoware Memory Vendors Username Remote Working Point of Sale Data Breach 5G Black Friday Google Play Be Proactive IP Address Google Docs Videos Unified Communications Database Electronic Health Records Experience Workforce Running Cable Tech Support IT Technicians Wasting Time Threats Bitcoin Network Management Google Wallet Proxy Server Cookies Trend Micro Monitors Cyber Monday Security Cameras Workplace Strategies Recovery Tactics Software as a Service Hotspot Meta Laptop Websites Mirgation Managing Costs Amazon Hard Drives Windows 8 Domains Drones Nanotechnology eCommerce SSID SharePoint Addiction Surveillance Electronic Medical Records Language Virtual Assistant Outsource IT Halloween Chatbots Virtual Machine Environment Media Refrigeration Management Public Speaking Lenovo Reviews Screen Reader Writing Distributed Denial of Service Medical IT Transportation Small Businesses Lithium-ion battery Service Level Agreement Development Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Hypervisor Displays Hacks Server Management Superfish Bookmark Shopping Identity Theft Smart Tech Optimization Fun PowerPoint Employer/Employee Relationships Outsourcing Deep Learning Download Twitter Alerts PCI DSS Error Navigation Undo Browsers Gig Economy Education Connectivity Social Engineering Break Fix Workplace Teamwork Hiring/Firing Upload Internet Service Provider Remote Computing Regulations Compliance Multi-Factor Security Evernote Paperless Mobile Computing Social Network Tablet IoT Memes Search Dark Web Co-managed IT SQL Server Technology Care Application Best Practice Trends Net Neutrality Alert Financial Data Buisness File Sharing Regulations History Dark Data Google Calendar Business Communications Managed IT Customer Resource management IBM Legal Data Analysis Smartwatch IT solutions Star Wars IT How To Microsoft Excel Scams Azure Hybrid Work Business Growth Gamification Procurement Notifications Staff Telework Travel Social Networking Cyber security Legislation Tech Human Resources Techology Fileless Malware CES Google Maps Communitications Cortana Cables

Blog Archive