Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Phishing Email Efficiency Workplace Tips Computer Privacy Google Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Communication Small Business Smartphones Mobile Device Mobile Devices communications Android Workplace Strategy Saving Money Smartphone Business Management VoIP Managed IT Services Managed Service Microsoft Office Data Recovery Browser Social Media Passwords Upgrade Network Backup Disaster Recovery Tech Term Internet of Things Automation Artificial Intelligence Covid-19 Remote Cloud Computing Remote Work Server Managed Service Provider Miscellaneous Windows Facebook Gadgets Encryption Spam Outsourced IT Holiday Windows 10 Employee/Employer Relationship Information Data Management Business Continuity Government Current Events Business Technology Productivity Wi-Fi Windows 10 Blockchain Apps Two-factor Authentication Compliance Data Security Bandwidth Virtualization App Employer-Employee Relationship Office Networking Mobile Device Management Chrome Gmail Budget Managed Services Voice over Internet Protocol Vendor Apple Applications Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Mobile Office Office 365 How To BDR Virtual Private Network Training Health Help Desk Operating System AI Computers Risk Management Retail Website Marketing Managed IT Services Analytics Office Tips Augmented Reality Storage Password BYOD HIPAA WiFi Bring Your Own Device Healthcare Router Big Data Social Display Free Resource Printer Project Management Paperless Office Going Green Windows 7 Infrastructure Monitoring Microsoft 365 Customer Service Cybercrime Tip of the week Document Management Solutions Telephone Scam Data loss Windows 11 Cooperation IT Support Firewall Excel Patch Management Save Money Remote Monitoring Vulnerability Remote Workers End of Support Vendor Management The Internet of Things User Tip Modem Vulnerabilities Data Privacy Processor Computer Repair Mobile Security Images 101 Customer Relationship Management Multi-Factor Authentication Mobility Settings Wireless Smart Technology Printing Content Filtering Machine Learning Hacking YouTube Saving Time Presentation Employees Cryptocurrency Managed IT Service Wireless Technology Integration Maintenance Downloads Antivirus Virtual Desktop Data storage LiFi Licensing Holidays Word Entertainment Outlook 2FA Data Storage Supply Chain Video Conferencing Money Humor Managed Services Provider Virtual Machines Robot Professional Services Telephone System Cost Management Safety Sports Mouse IT Management VPN Meetings iPhone Administration Telework Cyber security Application Best Practice Tech Human Resources Username CES Point of Sale Communitications Black Friday Cables Buisness IT solutions Database Supply Chain Management IBM Legal FinTech Tech Support IT Technicians Business Growth Term Google Apps Network Management Proxy Server Cookies IT Assessment Monitors Cyber Monday IT Maintenance Value Business Intelligence Cortana Tactics Flexibility Hotspot Organization Websites Mirgation Alt Codes Shortcuts Downtime Digital Security Cameras Nanotechnology Smart Devices Competition Ransmoware Memory Vendors Hosted Solution SharePoint Addiction Remote Working Electronic Medical Records Language Chatbots Data Breach Typing Google Play Be Proactive Management Lenovo Videos Screen Reader Electronic Health Records Writing Distributed Denial of Service Workforce Google Drive Wasting Time Threats User Knowledge Service Level Agreement Virtual Reality Computing Infrastructure Private Cloud Identity Trend Micro Security Cameras Workplace Strategies Server Management Superfish Bookmark 5G Identity Theft Smart Tech Software as a Service Meta IP Address Google Docs Managing Costs Amazon Unified Communications Experience Download Twitter Alerts Error eCommerce Bitcoin SSID Running Cable Browsers Connectivity Surveillance Social Engineering Break Fix Google Wallet Virtual Assistant Outsource IT Virtual Machine Environment Recovery Media Upload Remote Computing Reviews Multi-Factor Security Hard Drives Windows 8 Medical IT Laptop Social Network Tablet IoT Development Dark Web Domains Drones Transportation Small Businesses Hypervisor Displays Trends Alert Shopping File Sharing Regulations Optimization Dark Data Google Calendar Refrigeration PowerPoint Halloween Managed IT Customer Resource management Data Analysis Star Wars How To Microsoft Excel Public Speaking Employer/Employee Relationships Outsourcing Lithium-ion battery Navigation Gamification PCI DSS Notifications Staff Gig Economy Travel Social Networking Legislation Hacks Workplace Entrepreneur Scary Stories Techology Fileless Malware Fun Google Maps Internet Service Provider Teamwork Hiring/Firing Deep Learning Evernote Paperless Content Regulations Compliance Wearable Technology Health IT Unified Threat Management Motherboard Memes Comparison Undo Co-managed IT Education Unified Threat Management Directions Assessment Net Neutrality Permissions SQL Server Technology Care Financial Data History Business Communications Smartwatch IT Network Congestion Specifications Mobile Computing Scams Azure Hybrid Work User Error Microchip Search Internet Exlporer Procurement Physical Security Fraud

Blog Archive