Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking at the Future Impact of Blockchain

Looking at the Future Impact of Blockchain

For the past decade or so, one of the most mentioned emerging technologies is blockchain. It was hailed as the technology that would change everything, but as far as the practical uses that would facilitate that change, blockchain hasn’t seemed to have done much. Today, we thought we would take a closer look at blockchain and why it hasn’t become the world-altering technology a lot of people were expecting.

Continue reading
0 Comments

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Data Recovery VoIP Business Management AI Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Tech Term Network Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Automation Covid-19 Gadgets Cloud Computing Holiday Training Managed Service Provider Remote Work Server Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Data Security Vendor Apps Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week How To WiFi BDR HIPAA Applications Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Conferencing Marketing Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Operating System Risk Management Virtual Private Network 2FA Computers Help Desk Health Analytics Website Office Tips Document Management Telephone Firewall Cooperation Free Resource Scam Project Management Data loss Windows 7 The Internet of Things Microsoft 365 Social Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Windows 11 Customer Service Display Printer Monitoring Paperless Office Excel Infrastructure Remote Workers Money Humor Downloads Word iPhone Licensing Maintenance Entertainment Vulnerabilities Antivirus Sports Data Privacy Mouse Images 101 Safety Administration Multi-Factor Authentication Mobility Telephone System Cost Management Robot Settings Employees Wireless Integration Printing Content Filtering Modem IT Management Customer Relationship Management User Tip YouTube Meetings Processor Mobile Security VPN Holidays Cryptocurrency Hacking Presentation Computer Repair Data Storage Smart Technology Supply Chain Virtual Desktop Video Conferencing Data storage LiFi Wireless Technology Managed Services Provider Virtual Machines Professional Services Saving Time Outlook Managed IT Service Machine Learning Hard Drives Writing Download Net Neutrality Alerts SQL Server Technology Care Lenovo Business Communications Domains Virtual Reality Financial Data History Connectivity IT Break Fix Scams Hacks Server Management Scary Stories Private Cloud Browsers Smartwatch Identity Theft Refrigeration Fun Upload Procurement Azure Hybrid Work Superfish Multi-Factor Security Tech Human Resources Deep Learning Public Speaking Twitter Social Network Telework Cyber security CES IoT Communitications Dark Web Cables Lithium-ion battery Error Education Social Engineering Entrepreneur Trends Supply Chain Management Regulations Google Calendar Term Google Apps Remote Computing Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Mobile Computing Tablet Undo Search Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Best Practice Alert Organization Fileless Malware Digital Security Cameras Dark Data Smart Devices Ransmoware Managed IT Buisness File Sharing IT solutions How To Content Remote Working Wearable Technology Memory Vendors Legal Motherboard Data Breach Comparison Google Play Be Proactive Business Growth Notifications Health IT Application Directions Videos Assessment Electronic Health Records Permissions Workforce Travel Techology Google Maps Cortana Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Alt Codes IBM Downtime Unified Threat Management Microchip Internet Exlporer Software as a Service Fraud Meta Unified Threat Management Hosted Solution Username Managing Costs Amazon eCommerce Black Friday SSID Typing Network Congestion Database Surveillance Virtual Assistant Outsource IT Google Drive User Error Media Competition Knowledge IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Proxy Server Reviews Point of Sale 5G Tactics Development Hotspot Transportation Small Businesses Google Docs Unified Communications Experience Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Bitcoin Network Management Running Cable Tech Support User Shopping Monitors Addiction Language Employer/Employee Relationships Outsourcing Google Wallet Navigation Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Windows 8 IP Address Laptop Websites Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Drones SharePoint Evernote Paperless Electronic Medical Records Regulations Compliance Identity Smart Tech Memes Co-managed IT Halloween Recovery Bookmark

Blog Archive