Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Government Business Continuity Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Data Security Vendor Apps Two-factor Authentication Managed Services Mobile Office Gmail Apple Networking WiFi App BYOD Employer-Employee Relationship Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Managed IT Services How To HIPAA BDR Applications Computing Physical Security Information Technology Conferencing Access Control Hacker Office 365 Avoiding Downtime Marketing Router Big Data Operating System 2FA Help Desk Risk Management Virtual Private Network Computers Health Healthcare Analytics Office Tips Augmented Reality Website Retail Storage Password Bring Your Own Device Solutions The Internet of Things Going Green Patch Management Save Money Social Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime Monitoring Display Excel Printer Customer Service Paperless Office Managed IT Service Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Project Management Windows 7 Firewall Scam Microsoft 365 Data loss Administration Safety Employees Integration Robot User Tip Modem Mobile Security Settings Processor Wireless Printing Content Filtering Holidays IT Management YouTube Meetings Data Storage VPN Smart Technology Supply Chain Customer Relationship Management Video Conferencing Cryptocurrency Managed Services Provider Professional Services Computer Repair Saving Time Virtual Machines Hacking Virtual Desktop Presentation Data storage LiFi Downloads Wireless Technology Outlook iPhone Licensing Machine Learning Money Humor Vulnerabilities Entertainment Data Privacy Word Maintenance Images 101 Antivirus Sports Mobility Telephone System Multi-Factor Authentication Mouse Cost Management Content Remote Working Entrepreneur Wearable Technology Memory Vendors Mobile Computing Comparison Google Play Be Proactive Tablet Search Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Best Practice Alert Directions Videos Dark Data Undo Wasting Time Threats Managed IT Buisness File Sharing Legal Specifications Security Cameras Workplace Strategies IT solutions How To Trend Micro Internet Exlporer Software as a Service Fraud Meta Business Growth Notifications Microchip Travel Username Managing Costs Amazon Techology Black Friday SSID Google Maps Cortana eCommerce Application Database Surveillance Virtual Assistant Outsource IT Alt Codes Downtime Unified Threat Management IT Technicians Virtual Machine Environment Media Unified Threat Management Cyber Monday Medical IT Hosted Solution IBM Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Typing Network Congestion Mirgation Hypervisor Displays Google Drive User Error PowerPoint Knowledge Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Point of Sale 5G Competition Management PCI DSS Chatbots Navigation Google Docs Distributed Denial of Service Workplace Unified Communications Experience Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support Monitors Regulations Compliance Identity Google Wallet Evernote Paperless Smart Tech Memes Co-managed IT Bookmark User Download Net Neutrality Alerts SQL Server Technology Care Windows 8 Laptop Websites Business Communications Financial Data History Drones Connectivity IT SharePoint Break Fix Scams Electronic Medical Records IP Address Browsers Smartwatch Upload Procurement Azure Hybrid Work Halloween Multi-Factor Security Tech Human Resources Writing Social Network Telework Cyber security Lenovo IoT Communitications Dark Web Cables Virtual Reality CES Recovery Hard Drives Trends Supply Chain Management Hacks Server Management Scary Stories Private Cloud Google Calendar Term Google Apps Identity Theft Fun Domains Customer Resource management FinTech Regulations Superfish Star Wars IT Assessment Microsoft Excel IT Maintenance Deep Learning Twitter Data Analysis Refrigeration Gamification Flexibility Staff Value Business Intelligence Error Legislation Shortcuts Education Social Engineering Public Speaking Organization Social Networking Smart Devices Ransmoware Remote Computing Lithium-ion battery Fileless Malware Digital Security Cameras

Blog Archive