Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Information Artificial Intelligence Holiday Facebook Miscellaneous Gadgets Covid-19 Cloud Computing Compliance Training Remote Work Outsourced IT Server Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Windows 10 Wi-Fi Virtualization Blockchain Apps Vendor Mobile Office Data Security Two-factor Authentication Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Managed Services Mobile Device Management Voice over Internet Protocol Gmail BYOD WiFi Office 365 HIPAA Applications Hacker Avoiding Downtime How To Marketing BDR Conferencing Computing Information Technology Access Control Analytics Office Tips Router Augmented Reality Retail Storage Computers Password Bring Your Own Device 2FA Help Desk Managed IT Services Website Healthcare Operating System Physical Security Virtual Private Network Risk Management Big Data Health Solutions Document Management Customer Service Windows 11 Scam Data loss Monitoring Excel Going Green Patch Management Remote Workers Save Money Managed IT Service Remote Monitoring Firewall End of Support Vulnerability Telephone Vendor Management Cybercrime The Internet of Things Cooperation Free Resource Project Management Display Windows 7 Printer Social Paperless Office Infrastructure Microsoft 365 Outlook Customer Relationship Management Machine Learning Employees Money Humor Integration User Tip Modem Hacking Processor Maintenance Presentation Mobile Security Antivirus Sports Holidays Mouse Wireless Technology Data Storage Administration Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Word Robot Settings Wireless Downloads Printing Content Filtering iPhone IT Management Licensing VPN Safety YouTube Meetings Entertainment Vulnerabilities Cryptocurrency Data Privacy Images 101 Computer Repair Multi-Factor Authentication Mobility Telephone System Virtual Desktop Data storage LiFi Cost Management Windows 8 Content Remote Working IBM Laptop Websites Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Drones Health IT SharePoint Directions Videos Assessment Electronic Health Records Electronic Medical Records Permissions Workforce Halloween Wasting Time Threats Trend Micro Writing Specifications Security Cameras Workplace Strategies Lenovo Microchip Internet Exlporer Software as a Service Competition Virtual Reality Fraud Meta Managing Costs Amazon Hacks Server Management Username Scary Stories Private Cloud Identity Theft eCommerce Fun Black Friday SSID Superfish Deep Learning Database Surveillance Twitter Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment User Media Error Proxy Server Reviews Education Cookies Social Engineering Cyber Monday Medical IT Tactics Development Remote Computing Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Mobile Computing IP Address Shopping Tablet Nanotechnology Optimization Search PowerPoint Best Practice Addiction Alert Language Employer/Employee Relationships Outsourcing Chatbots Recovery Dark Data Navigation Managed IT Management PCI DSS Buisness File Sharing Gig Economy IT solutions Screen Reader Hard Drives How To Distributed Denial of Service Workplace Legal Business Growth Service Level Agreement Internet Service Provider Domains Notifications Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Regulations Compliance Travel Bookmark Google Maps Smart Tech Memes Refrigeration Cortana Co-managed IT Techology Alt Codes Download Net Neutrality Public Speaking Alerts SQL Server Technology Care History Business Communications Financial Data Lithium-ion battery Downtime Unified Threat Management Browsers Smartwatch Hosted Solution Connectivity IT Break Fix Scams Entrepreneur Unified Threat Management Typing Upload Procurement Azure Hybrid Work Cyber security Network Congestion Multi-Factor Security Tech Human Resources Social Network Telework CES IoT Communitications Undo Knowledge Dark Web Cables Google Drive User Error Trends Supply Chain Management Regulations 5G Google Calendar Term Google Apps Customer Resource management FinTech Point of Sale Data Analysis Unified Communications Star Wars IT Assessment Experience Microsoft Excel IT Maintenance Google Docs Bitcoin Network Management Gamification Flexibility Running Cable Tech Support Staff Value Business Intelligence Social Networking Application Monitors Legislation Shortcuts Google Wallet Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware

Blog Archive