Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Phishing Email Computer Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service Android VoIP Business Management Smartphones Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Windows Managed IT Services Microsoft Office Tech Term Remote Current Events Network Productivity Internet of Things Automation Artificial Intelligence Facebook Cloud Computing AI Covid-19 Gadgets Server Managed Service Provider Remote Work Miscellaneous Holiday Outsourced IT Information Spam Training Compliance Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Apps Two-factor Authentication Mobile Office IT Support Data Security Vendor Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Chrome Budget Gmail Apple Networking App Applications Computing Information Technology Hacker Avoiding Downtime Access Control Conferencing Office 365 Marketing Tip of the week WiFi How To BDR HIPAA Operating System Healthcare Computers Help Desk Virtual Private Network Risk Management Health Website Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Cybercrime Customer Service Physical Security Monitoring Display Printer Paperless Office Free Resource Windows 11 Project Management Infrastructure Windows 7 2FA Microsoft 365 Excel Telephone Document Management Solutions Firewall Cooperation Scam Data loss The Internet of Things Social Going Green Patch Management Save Money Virtual Machines Professional Services Settings User Tip Wireless Modem Printing Customer Relationship Management Processor Content Filtering Mobile Security IT Management Meetings VPN YouTube Hacking Cryptocurrency Presentation iPhone Smart Technology Computer Repair Wireless Technology Vulnerabilities Saving Time Virtual Desktop LiFi Data storage Images 101 Managed IT Service Supply Chain Multi-Factor Authentication Mobility Outlook Downloads Word Machine Learning Money Licensing Humor Entertainment Maintenance Employees Antivirus Integration Sports Mouse Safety Telephone System Administration Cost Management Holidays Data Privacy Data Storage Robot Video Conferencing Managed Services Provider Gig Economy Alt Codes Vendors Username Unified Threat Management Black Friday Internet Service Provider Teamwork Downtime Be Proactive Unified Threat Management Hosted Solution Workforce Evernote Database Regulations Compliance IT Technicians Memes Typing Threats Competition Proxy Server Cookies Network Congestion Cyber Monday Net Neutrality SQL Server Workplace Strategies User Error History Meta Knowledge Tactics Hotspot Financial Data Google Drive Mirgation Smartwatch IT Amazon Point of Sale 5G Nanotechnology Procurement Azure User Cyber security Unified Communications Outsource IT Tech Experience Addiction Language Telework Google Docs Chatbots CES Communitications Bitcoin Environment Network Management Running Cable Media Management Tech Support Screen Reader Monitors Distributed Denial of Service Supply Chain Management Google Wallet IP Address Small Businesses Term Service Level Agreement Computing Infrastructure FinTech Identity IT Assessment Windows 8 Displays Laptop Websites Recovery Bookmark Smart Tech Flexibility Drones Value SharePoint Outsourcing Hard Drives Download Electronic Medical Records Alerts Organization Digital Security Cameras Smart Devices Domains Halloween Browsers Connectivity Writing Break Fix Remote Working Lenovo Memory Workplace Data Breach Hiring/Firing Refrigeration Google Play Upload Virtual Reality Videos Multi-Factor Security Electronic Health Records Hacks Public Speaking Server Management Scary Stories Paperless Social Network Private Cloud Co-managed IT Identity Theft Fun IoT Dark Web Lithium-ion battery Superfish Wasting Time Trend Micro Deep Learning Technology Care Security Cameras Entrepreneur Trends Twitter Regulations Google Calendar Software as a Service Business Communications Customer Resource management Error Education Scams Data Analysis Star Wars Social Engineering Microsoft Excel Managing Costs eCommerce Hybrid Work Undo SSID Gamification Remote Computing Staff Social Networking Legislation Surveillance Mobile Computing Virtual Assistant Human Resources Cables Fileless Malware Tablet Search Virtual Machine Reviews Best Practice Medical IT Content Alert Wearable Technology Motherboard Dark Data Comparison Development Managed IT Transportation Buisness Google Apps Health IT File Sharing Hypervisor IT solutions IT Maintenance Application Directions Assessment How To Permissions Legal Shopping Optimization Business Growth Business Intelligence PowerPoint Notifications Travel Specifications IBM Employer/Employee Relationships Shortcuts Techology Ransmoware Microchip Google Maps Navigation Cortana Internet Exlporer Fraud PCI DSS

Blog Archive