Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer IT Services Users Collaboration Hosted Solutions Mobile Device Ransomware Quick Tips Microsoft Cybersecurity Workplace Strategy Small Business Data Backup Communication Passwords Smartphone Saving Money Android Backup Business Management VoIP Smartphones communications Mobile Devices Upgrade Managed Service Disaster Recovery Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Automation Current Events Cloud Computing Covid-19 Productivity Server Managed Service Provider Remote Work Miscellaneous Gadgets Information Holiday Outsourced IT AI Employee/Employer Relationship Encryption Spam Windows 10 Office Government Training Data Management Business Continuity Compliance Wi-Fi Blockchain Windows 10 Bandwidth Business Technology Virtualization Data Security Two-factor Authentication Mobile Office Apps Mobile Device Management Vendor Chrome Gmail Budget Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking How To Computing Hacker BDR Information Technology Avoiding Downtime Marketing Office 365 BYOD Applications Access Control WiFi Tip of the week Conferencing Computers Risk Management Website HIPAA Analytics Office Tips Router IT Support Augmented Reality Virtual Private Network Storage Health Password Bring Your Own Device Help Desk Big Data Retail Healthcare Operating System Managed IT Services Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Display Printer Windows 11 Paperless Office Infrastructure Monitoring 2FA The Internet of Things Excel Social Document Management Remote Workers Going Green Telephone Scam Data loss Customer Service Cybercrime YouTube Data Privacy Presentation Cryptocurrency Images 101 Wireless Technology Robot Mobility Telephone System Multi-Factor Authentication Cost Management Virtual Desktop Data storage LiFi Word IT Management Outlook VPN Employees Meetings Physical Security Integration Money Humor User Tip Modem Computer Repair Mobile Security Processor Safety Holidays Sports Mouse Data Storage Smart Technology Supply Chain Video Conferencing Administration Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Managed IT Service Maintenance Customer Relationship Management Antivirus Downloads iPhone Settings Wireless Licensing Printing Content Filtering Vulnerabilities Hacking Entertainment Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Google Drive User Managed IT Customer Resource management FinTech Knowledge File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility 5G Notifications Staff Value Business Intelligence Legislation Shortcuts IP Address Google Docs Unified Communications Organization Experience Travel Social Networking Google Maps Smart Devices Ransmoware Bitcoin Techology Fileless Malware Digital Security Cameras Running Cable Content Remote Working Wearable Technology Memory Vendors Google Wallet Comparison Google Play Be Proactive Recovery Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Hard Drives Windows 8 Unified Threat Management Directions Videos Laptop Wasting Time Threats Domains Drones Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Fraud Meta Refrigeration User Error Microchip Halloween Username Managing Costs Amazon Public Speaking Black Friday SSID Lithium-ion battery Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Hacks Entrepreneur Scary Stories Network Management Fun Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Deep Learning Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Undo Education Websites Mirgation Hypervisor Displays PowerPoint Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Mobile Computing SharePoint Management PCI DSS Search Chatbots Navigation Writing Distributed Denial of Service Workplace Application Best Practice Lenovo Gig Economy Screen Reader Buisness Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing IBM Legal IT solutions Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Business Growth Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Cortana Error History Business Communications Social Engineering Break Fix Scams Alt Codes Browsers Smartwatch Connectivity IT Downtime Upload Procurement Remote Computing Azure Hybrid Work Competition Hosted Solution Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Tablet IoT Communitications Dark Web Cables Typing CES

Blog Archive