Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

House of Representatives Makes Moves to Support Small Business

House of Representatives Makes Moves to Support Small Business

Without competition, there would not be businesses. However, this competition needs to be fair in order for small businesses to embrace new opportunities that arise. A U.S. bill that allows for both of these goals has passed in the House of Representatives and will be voted on in the Senate.

Bill 2763, or the Small Business Innovation Research and Small Business Technology Transfer Improvements Act, establishes the requirement for the Small Business Administration to provide Congress with reports of their programs as well as mandates that the Department of Defense utilize more technology from small businesses.

Authored by Steve Knight, representative of California’s 25th congressional district, the bill “would give the opportunity for America’s small businesses to participate in the national security needs for innovation in our country,” as Knight put it. Knight also said that programs like these improve safety and economic stability.

Representative Lamar Smith, chairman of the House Science, Space and Technology Committee, voiced his support in a statement of his own.

“The SBIR [Small Business Innovation Research] and STTR [Small Business Technology Transfer] programs, through their $3 billion in annual awards to small businesses, spur many innovations and create thousands of jobs,” Smith said. “This legislation updates these crucial programs.”

Knight seems to agree.

“These programs sponsor developments that allow us to compete in the international marketplace and provide innovative tools supported and created by local entrepreneurs that contribute to American security.”

At Voyage Technology, we feel the same way about what we do for businesses like yours. For help implementing the tools you need for success, reach out at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Miscellaneous Holiday Information Automation Artificial Intelligence Facebook Gadgets Covid-19 Training Compliance Cloud Computing Remote Work Server Outsourced IT Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Vendor Apps Two-factor Authentication Mobile Office Managed Services Data Security Employer-Employee Relationship Tip of the week Chrome Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App WiFi BYOD Computing Physical Security HIPAA Information Technology Applications Access Control Office 365 Hacker Avoiding Downtime Marketing Conferencing Managed IT Services How To BDR Risk Management Virtual Private Network Router Health Analytics Office Tips Computers Augmented Reality 2FA Help Desk Retail Storage Website Password Bring Your Own Device Healthcare Operating System Big Data Social Solutions Display Printer Paperless Office Infrastructure Customer Service Windows 11 Document Management Monitoring Excel Scam Data loss Remote Workers Managed IT Service Telephone Firewall Cooperation Free Resource Going Green Patch Management Save Money Project Management Windows 7 Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Microsoft 365 Cybercrime VPN Meetings YouTube Cryptocurrency Employees Computer Repair Integration Customer Relationship Management Virtual Desktop Data storage LiFi User Tip Modem Mobile Security Processor Hacking Outlook Holidays Presentation Machine Learning Data Storage Money Humor Wireless Technology Smart Technology Supply Chain Video Conferencing Managed Services Provider Maintenance Saving Time Virtual Machines Professional Services Antivirus Sports Mouse Word Administration Downloads iPhone Licensing Vulnerabilities Entertainment Safety Robot Data Privacy Images 101 Settings Wireless Printing Telephone System Content Filtering Multi-Factor Authentication Mobility IT Management Cost Management Content Remote Working Network Congestion Wearable Technology Memory Vendors Application Google Drive User Error Health IT Knowledge Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Directions Videos Assessment Electronic Health Records IBM Point of Sale 5G Wasting Time Threats Google Docs Unified Communications Experience Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Bitcoin Network Management Microchip Tech Support Running Cable Internet Exlporer Software as a Service Username Monitors Managing Costs Amazon Google Wallet eCommerce Competition Black Friday SSID Virtual Assistant Outsource IT Windows 8 Websites Laptop Database Surveillance IT Technicians Virtual Machine Environment Media Drones SharePoint Proxy Server Reviews Electronic Medical Records Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses User Halloween Tactics Development Writing Mirgation Hypervisor Displays Lenovo Shopping Virtual Reality Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Hacks Server Management Private Cloud Scary Stories Addiction IP Address Identity Theft Management PCI DSS Fun Chatbots Navigation Superfish Deep Learning Gig Economy Twitter Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Recovery Error Service Level Agreement Internet Service Provider Education Regulations Compliance Social Engineering Identity Hard Drives Evernote Paperless Bookmark Remote Computing Smart Tech Memes Domains Co-managed IT Alerts SQL Server Technology Care Mobile Computing Download Net Neutrality Tablet Financial Data Search History Refrigeration Business Communications Best Practice Browsers Smartwatch Alert Connectivity IT Public Speaking Break Fix Scams Upload Procurement Lithium-ion battery Dark Data Azure Hybrid Work Managed IT File Sharing Buisness IT solutions Social Network Telework How To Cyber security Multi-Factor Security Tech Human Resources Entrepreneur Legal Dark Web Cables Business Growth CES Notifications IoT Communitications Trends Supply Chain Management Travel Google Maps Customer Resource management FinTech Cortana Regulations Undo Google Calendar Term Google Apps Techology Microsoft Excel IT Maintenance Alt Codes Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Unified Threat Management Downtime Hosted Solution Organization Social Networking Legislation Shortcuts Unified Threat Management Ransmoware Typing Fileless Malware Digital Security Cameras Smart Devices

Blog Archive