Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Email Workplace Tips Phishing Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Compliance Covid-19 Gadgets Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Apps Two-factor Authentication Managed Services Mobile Office Data Security Vendor Employer-Employee Relationship BYOD Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Applications Computing Physical Security Information Technology Hacker Access Control Avoiding Downtime Office 365 Conferencing Marketing Password Managed IT Services How To BDR HIPAA Operating System Virtual Private Network Risk Management 2FA Computers Help Desk Health Analytics Website Office Tips Augmented Reality Healthcare Retail Storage Bring Your Own Device Big Data Router Vendor Management Cybercrime Windows 11 Customer Service Display Printer Monitoring Paperless Office Excel Infrastructure Managed IT Service Remote Workers Document Management Telephone Firewall Scam Cooperation Free Resource Data loss Project Management Windows 7 The Internet of Things Microsoft 365 Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Content Filtering Modem IT Management User Tip Customer Relationship Management VPN Processor YouTube Meetings Mobile Security Holidays Cryptocurrency Hacking Data Storage Presentation Computer Repair Smart Technology Supply Chain Virtual Desktop Video Conferencing Data storage LiFi Wireless Technology Managed Services Provider Virtual Machines Professional Services Saving Time Outlook Machine Learning Money Downloads Humor Word iPhone Licensing Maintenance Sports Vulnerabilities Antivirus Entertainment Mouse Data Privacy Images 101 Safety Administration Mobility Telephone System Multi-Factor Authentication Cost Management Robot Employees Settings Wireless Integration Printing Unified Threat Management Hosted Solution Username Managing Costs Amazon eCommerce Black Friday SSID Typing Database Surveillance Network Congestion Virtual Assistant Outsource IT Media Google Drive User Error Competition Knowledge IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Proxy Server Reviews Point of Sale Tactics Development 5G Hotspot Transportation Small Businesses Google Docs Unified Communications Experience Mirgation Hypervisor Displays Running Cable Tech Support Nanotechnology Optimization User PowerPoint Bitcoin Network Management Shopping Google Wallet Addiction Monitors Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Chatbots Laptop Websites Screen Reader Distributed Denial of Service Workplace Windows 8 Gig Economy IP Address Drones Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless SharePoint Regulations Compliance Electronic Medical Records Identity Halloween Smart Tech Memes Recovery Co-managed IT Bookmark Lenovo Download Net Neutrality Hard Drives Writing Alerts SQL Server Technology Care Business Communications Financial Data Domains Virtual Reality History Scary Stories Private Cloud Connectivity IT Break Fix Scams Hacks Server Management Browsers Smartwatch Superfish Identity Theft Upload Procurement Refrigeration Fun Azure Hybrid Work Multi-Factor Security Tech Human Resources Deep Learning Social Network Telework Public Speaking Twitter Cyber security Error IoT Communitications Dark Web Cables CES Lithium-ion battery Education Trends Supply Chain Management Social Engineering Entrepreneur Google Calendar Term Google Apps Customer Resource management FinTech Remote Computing Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Mobile Computing Data Analysis Tablet Gamification Flexibility Undo Search Staff Value Business Intelligence Legislation Shortcuts Best Practice Organization Alert Social Networking Buisness File Sharing Smart Devices Dark Data Ransmoware Managed IT Fileless Malware Digital Security Cameras Legal IT solutions Content Remote Working How To Wearable Technology Memory Vendors Comparison Google Play Be Proactive Business Growth Health IT Notifications Motherboard Data Breach Travel Assessment Electronic Health Records Application Permissions Workforce Directions Videos Techology Google Maps Cortana Wasting Time Threats Specifications Security Cameras Workplace Strategies Alt Codes IBM Trend Micro Microchip Downtime Unified Threat Management Internet Exlporer Software as a Service Fraud Meta

Blog Archive