Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Prefer Your Reality Augmented, or Virtual?

Do You Prefer Your Reality Augmented, or Virtual?

At the International Consumer Electronics Show (CES), new products (and the technologies that fuel those products) are put on display to give industry professionals a look to see what companies are working on. At CES 2018, held in Las Vegas, Band and Olufsen introduced their speakers-as-art-concept, Samsung unveiled a 146” television that is designed to take up a wall, and many companies, including Aura, introduced new smart home security products that are sure to get an intruder’s attention (over Wi-Fi).

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Google Privacy Email Workplace Tips Computer Workplace Strategy Collaboration Backup Small Business Hosted Solutions Users Ransomware AI Managed Service Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Compliance Cloud Computing Training Gadgets Covid-19 Outsourced IT Managed Service Provider Remote Work IT Support Server Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Wi-Fi Virtualization Blockchain Vendor Business Technology Bandwidth Mobile Office Managed Services Data Security Two-factor Authentication Apps Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Budget Marketing Conferencing Managed IT Services How To BDR Computing Physical Security Information Technology HIPAA Access Control Applications Office 365 Hacker Avoiding Downtime Password Website Bring Your Own Device Healthcare Operating System Big Data Virtual Private Network Risk Management Router Health Analytics Office Tips Augmented Reality Computers 2FA Retail Help Desk Storage Scam Data loss Managed IT Service Remote Workers Telephone Firewall Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource End of Support Vulnerability Project Management Windows 7 Vendor Management The Internet of Things Cybercrime Microsoft 365 Social Display Solutions Printer Paperless Office Infrastructure Customer Service Document Management Windows 11 Monitoring Excel Professional Services Saving Time Mouse Virtual Machines Word Administration Downloads iPhone Licensing Robot Vulnerabilities Entertainment Data Privacy Settings Safety Wireless Printing Content Filtering Images 101 IT Management Telephone System VPN Multi-Factor Authentication YouTube Meetings Mobility Cost Management Cryptocurrency Computer Repair Employees Virtual Desktop LiFi Integration Customer Relationship Management Data storage User Tip Modem Mobile Security Processor Outlook Hacking Machine Learning Presentation Money Holidays Humor Data Storage Wireless Technology Smart Technology Supply Chain Video Conferencing Maintenance Antivirus Managed Services Provider Sports Distributed Denial of Service Workplace Social Engineering Gig Economy Screen Reader Education Service Level Agreement Internet Service Provider Recovery Computing Infrastructure Teamwork Hiring/Firing Remote Computing Regulations Compliance Hard Drives Mobile Computing Identity Evernote Paperless Co-managed IT Search Bookmark Domains Smart Tech Memes Tablet Download Net Neutrality Best Practice Alerts SQL Server Technology Care Alert Financial Data Refrigeration Managed IT History Buisness File Sharing Business Communications Dark Data IT solutions Break Fix Scams How To Browsers Smartwatch Public Speaking Legal Connectivity IT Upload Procurement Business Growth Azure Hybrid Work Notifications Lithium-ion battery Social Network Telework Cyber security Entrepreneur Travel Multi-Factor Security Tech Human Resources Google Maps Dark Web Cables Cortana CES Techology IoT Communitications Trends Supply Chain Management Alt Codes Customer Resource management FinTech Undo Regulations Downtime Unified Threat Management Google Calendar Term Google Apps Hosted Solution Microsoft Excel IT Maintenance Data Analysis Unified Threat Management Star Wars IT Assessment Gamification Flexibility Typing Staff Value Business Intelligence Network Congestion Organization Social Networking Legislation Shortcuts Ransmoware Knowledge Fileless Malware Digital Security Cameras Google Drive User Error Smart Devices Content Remote Working Application Wearable Technology Memory Vendors 5G Health IT Motherboard Data Breach Point of Sale Comparison Google Play Be Proactive Unified Communications Permissions Workforce Experience Directions Videos IBM Google Docs Assessment Electronic Health Records Bitcoin Network Management Wasting Time Threats Running Cable Tech Support Monitors Google Wallet Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Internet Exlporer Software as a Service Username Windows 8 Managing Costs Amazon Laptop Websites Competition Drones eCommerce Black Friday SSID Virtual Assistant Outsource IT Electronic Medical Records SharePoint Database Surveillance IT Technicians Virtual Machine Environment Halloween Media Writing Proxy Server Reviews Lenovo Cookies Cyber Monday Medical IT User Hotspot Transportation Small Businesses Virtual Reality Tactics Development Hacks Server Management Mirgation Hypervisor Displays Scary Stories Private Cloud Fun Shopping Superfish Nanotechnology Optimization Identity Theft PowerPoint Addiction Deep Learning Language Employer/Employee Relationships Outsourcing Twitter IP Address Management PCI DSS Chatbots Error Navigation

Blog Archive