Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android AI Upgrade Business Management Smartphones Disaster Recovery Data Recovery VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Information Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Training Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain Virtualization Wi-Fi Business Technology Bandwidth Data Security Vendor Apps Two-factor Authentication Mobile Office App Gmail BYOD Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Voice over Internet Protocol Apple Networking Mobile Device Management BDR HIPAA WiFi Computing Applications Information Technology Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To Operating System Router Big Data Risk Management Virtual Private Network Health Help Desk Analytics Office Tips 2FA Augmented Reality Computers Retail Storage Password Website Bring Your Own Device Healthcare Managed IT Services Free Resource Firewall Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability The Internet of Things Vendor Management Cybercrime Solutions Physical Security Social Display Printer Paperless Office Infrastructure Windows 11 Monitoring Customer Service Document Management Excel Telephone Remote Workers Scam Data loss Cooperation Data Privacy Robot Telephone System Images 101 Cost Management Mobility Safety Settings Multi-Factor Authentication Wireless Printing Content Filtering IT Management YouTube Meetings VPN Cryptocurrency Employees Modem Integration User Tip Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Customer Relationship Management Holidays Smart Technology Outlook Data Storage Supply Chain Machine Learning Hacking Video Conferencing Presentation Money Saving Time Humor Managed Services Provider Professional Services Virtual Machines Wireless Technology Managed IT Service Maintenance Downloads Antivirus Sports Mouse Licensing iPhone Administration Word Entertainment Vulnerabilities IT solutions Star Wars Supply Chain Management Public Speaking How To Microsoft Excel Legal Data Analysis Business Growth Gamification FinTech Lithium-ion battery Notifications Staff Term Google Apps IT Assessment Legislation IT Maintenance Entrepreneur Travel Social Networking Techology Fileless Malware Google Maps Flexibility Cortana Value Business Intelligence Shortcuts Alt Codes Content Organization Wearable Technology Downtime Unified Threat Management Motherboard Smart Devices Undo Comparison Ransmoware Health IT Digital Security Cameras Unified Threat Management Directions Hosted Solution Assessment Remote Working Permissions Memory Vendors Google Play Be Proactive Typing Data Breach Electronic Health Records Network Congestion Specifications Workforce Videos Google Drive User Error Microchip Internet Exlporer Knowledge Fraud Wasting Time Threats Security Cameras Workplace Strategies Username Trend Micro Application Point of Sale Software as a Service 5G Black Friday Meta Google Docs Unified Communications Database IBM Experience Managing Costs Amazon SSID Bitcoin Network Management Running Cable Tech Support IT Technicians eCommerce Cookies Surveillance Monitors Cyber Monday Virtual Assistant Outsource IT Google Wallet Proxy Server Tactics Hotspot Virtual Machine Environment Media Medical IT Windows 8 Reviews Laptop Websites Mirgation Nanotechnology Development Competition Transportation Small Businesses Drones SharePoint Addiction Electronic Medical Records Language Hypervisor Displays PowerPoint Management Shopping Halloween Chatbots Optimization Screen Reader Writing Distributed Denial of Service Employer/Employee Relationships Outsourcing Lenovo Service Level Agreement PCI DSS Virtual Reality Computing Infrastructure User Navigation Workplace Hacks Server Management Gig Economy Scary Stories Private Cloud Identity Identity Theft Smart Tech Internet Service Provider Fun Teamwork Hiring/Firing Superfish Bookmark Deep Learning Download Regulations Compliance IP Address Twitter Alerts Evernote Paperless Co-managed IT Error Memes Education Connectivity Net Neutrality Social Engineering Break Fix SQL Server Technology Care Browsers Upload Financial Data Remote Computing History Recovery Business Communications Hard Drives Multi-Factor Security Scams Mobile Computing Social Network Smartwatch IT Tablet IoT Procurement Domains Search Dark Web Azure Hybrid Work Best Practice Trends Telework Alert Cyber security Tech Human Resources Refrigeration Dark Data Google Calendar Cables Managed IT Customer Resource management CES Buisness File Sharing Regulations Communitications

Blog Archive