Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Passwords Quick Tips Saving Money Communication Managed Service Cybersecurity Smartphone Data Backup Android AI Disaster Recovery Data Recovery Upgrade Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Artificial Intelligence Miscellaneous Information Holiday Gadgets Covid-19 Cloud Computing Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Business Technology Virtualization Blockchain Bandwidth Wi-Fi Windows 10 Vendor Apps Data Security Mobile Office Two-factor Authentication Tip of the week WiFi Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Managed Services Voice over Internet Protocol Mobile Device Management Gmail Office 365 HIPAA Applications How To BDR Hacker Avoiding Downtime Marketing Computing Conferencing Information Technology Access Control Office Tips Analytics Augmented Reality Big Data Retail Storage Password Router Bring Your Own Device Managed IT Services Computers 2FA Help Desk Operating System Website Virtual Private Network Healthcare Risk Management Health Cooperation Free Resource Project Management The Internet of Things Windows 7 Document Management Microsoft 365 Social Solutions Scam Data loss Customer Service Windows 11 Going Green Patch Management Monitoring Save Money Remote Monitoring Vulnerability Excel End of Support Vendor Management Cybercrime Remote Workers Physical Security Display Telephone Printer Firewall Paperless Office Infrastructure Safety Data Privacy Images 101 Outlook Machine Learning Telephone System Multi-Factor Authentication Money Mobility Cost Management Humor Maintenance Antivirus Sports Employees Mouse Customer Relationship Management Integration User Tip Modem Administration Processor Mobile Security Hacking Holidays Presentation Robot Data Storage Wireless Technology Smart Technology Supply Chain Settings Video Conferencing Managed Services Provider Printing Wireless Saving Time Virtual Machines Professional Services Content Filtering IT Management VPN YouTube Meetings Managed IT Service Word Cryptocurrency Downloads iPhone Computer Repair Licensing Virtual Desktop Entertainment Data storage Vulnerabilities LiFi Windows 8 Laptop Websites Trends Supply Chain Management Regulations Drones Undo Google Calendar Term Google Apps Customer Resource management FinTech Electronic Medical Records Data Analysis Star Wars IT Assessment SharePoint Microsoft Excel IT Maintenance Halloween Gamification Flexibility Staff Value Business Intelligence Organization Social Networking Lenovo Legislation Shortcuts Writing Virtual Reality Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Hacks Server Management Application Scary Stories Private Cloud Content Remote Working Health IT Motherboard Data Breach Superfish Comparison Google Play Be Proactive Identity Theft Fun Twitter Directions Videos Assessment Electronic Health Records IBM Permissions Workforce Deep Learning Wasting Time Threats Error Trend Micro Specifications Security Cameras Workplace Strategies Education Social Engineering Remote Computing Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Mobile Computing Username eCommerce Competition Black Friday SSID Tablet Search Alert Database Surveillance Virtual Assistant Outsource IT Best Practice IT Technicians Virtual Machine Environment Managed IT Media Buisness File Sharing Dark Data Proxy Server Reviews Cookies Legal Cyber Monday Medical IT IT solutions How To Notifications Tactics Development Hotspot Transportation Small Businesses Business Growth User Mirgation Hypervisor Displays Travel Shopping Nanotechnology Optimization Techology PowerPoint Google Maps Cortana Addiction IP Address Language Employer/Employee Relationships Outsourcing Alt Codes Chatbots Navigation Downtime Unified Threat Management Management PCI DSS Gig Economy Screen Reader Unified Threat Management Distributed Denial of Service Workplace Hosted Solution Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Typing Recovery Identity Hard Drives Evernote Paperless Network Congestion Regulations Compliance Bookmark Smart Tech Memes Google Drive User Error Domains Co-managed IT Knowledge Download Net Neutrality Alerts SQL Server Technology Care History Refrigeration Business Communications Point of Sale 5G Financial Data Browsers Smartwatch Connectivity IT Google Docs Public Speaking Break Fix Scams Unified Communications Experience Running Cable Tech Support Upload Procurement Lithium-ion battery Azure Hybrid Work Bitcoin Network Management Cyber security Google Wallet Multi-Factor Security Tech Human Resources Entrepreneur Monitors Social Network Telework CES IoT Communitications Dark Web Cables

Blog Archive