Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Productivity Small Business Backup Passwords Quick Tips Saving Money Cybersecurity Communication Managed Service Smartphone Data Backup Android Upgrade AI Data Recovery Disaster Recovery Business Management VoIP Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Information Facebook Miscellaneous Automation Cloud Computing Holiday Training Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Two-factor Authentication Mobile Office Data Security Vendor Apps Networking Mobile Device Management Chrome Managed Services Voice over Internet Protocol Gmail Budget BYOD Apple App Employer-Employee Relationship Tip of the week Conferencing Computing Hacker Information Technology Avoiding Downtime How To Marketing BDR Office 365 HIPAA Applications WiFi Access Control Operating System Retail Computers Risk Management Managed IT Services Website 2FA Analytics Office Tips Augmented Reality Healthcare Storage Router Password Virtual Private Network Bring Your Own Device Big Data Health Help Desk Customer Service Cybercrime Telephone Scam Data loss Windows 11 Cooperation Excel Patch Management Save Money Firewall Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Physical Security The Internet of Things Display Printer Free Resource Project Management Windows 7 Paperless Office Social Infrastructure Monitoring Microsoft 365 Going Green Solutions Document Management Content Filtering Employees Integration Hacking Managed IT Service YouTube Maintenance Presentation Downloads Antivirus Cryptocurrency Wireless Technology Licensing Holidays Entertainment Virtual Desktop Data Storage Data storage Supply Chain LiFi Video Conferencing Word Managed Services Provider Virtual Machines Telephone System Outlook Professional Services Robot Cost Management Money Humor IT Management VPN Safety iPhone Meetings Sports Mouse User Tip Vulnerabilities Modem Processor Data Privacy Computer Repair Mobile Security Administration Images 101 Mobility Multi-Factor Authentication Smart Technology Customer Relationship Management Machine Learning Saving Time Settings Wireless Printing Security Cameras Workplace Strategies Private Cloud Identity Hosted Solution Trend Micro Server Management Software as a Service Superfish Bookmark Meta Identity Theft Smart Tech Typing Managing Costs Amazon Download Twitter Alerts Google Drive SSID Error User Knowledge eCommerce Surveillance Browsers Virtual Assistant Outsource IT Connectivity Social Engineering Break Fix 5G Virtual Machine Environment Upload Media Remote Computing Social Network IP Address Google Docs Medical IT Unified Communications Multi-Factor Security Experience Reviews Development Transportation Small Businesses Tablet IoT Bitcoin Dark Web Running Cable Alert Hypervisor Displays Trends Google Wallet Managed IT Customer Resource management PowerPoint File Sharing Regulations Recovery Dark Data Google Calendar Shopping Optimization Data Analysis Employer/Employee Relationships Outsourcing Star Wars Hard Drives Windows 8 How To Microsoft Excel Laptop Notifications Staff PCI DSS Gamification Domains Drones Navigation Workplace Travel Social Networking Legislation Gig Economy Internet Service Provider Techology Fileless Malware Teamwork Hiring/Firing Google Maps Refrigeration Halloween Evernote Paperless Wearable Technology Regulations Compliance Content Public Speaking Memes Health IT Lithium-ion battery Co-managed IT Unified Threat Management Motherboard Comparison Net Neutrality Unified Threat Management Directions SQL Server Technology Care Assessment Hacks Permissions Entrepreneur Scary Stories Business Communications Fun Financial Data History IT Scams Deep Learning Network Congestion Specifications Smartwatch Procurement User Error Microchip Azure Hybrid Work Internet Exlporer Undo Fraud Tech Human Resources Education Telework Cyber security Username Communitications Cables Point of Sale Black Friday CES Supply Chain Management Database Mobile Computing Term Google Apps Tech Support IT Technicians Search FinTech Network Management IT Assessment Proxy Server IT Maintenance Cookies Application Best Practice Monitors Cyber Monday Buisness Flexibility Value Business Intelligence Tactics Hotspot IBM Legal Shortcuts Websites Mirgation IT solutions Organization Smart Devices Ransmoware Nanotechnology Business Growth Digital Security Cameras Remote Working SharePoint Memory Vendors Addiction Electronic Medical Records Language Google Play Be Proactive Chatbots Cortana Data Breach Management Electronic Health Records Lenovo Workforce Screen Reader Alt Codes Writing Distributed Denial of Service Videos Downtime Wasting Time Threats Service Level Agreement Competition Virtual Reality Computing Infrastructure

Blog Archive