Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade AI Business Management Smartphones VoIP Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Data Management Business Continuity Government Windows 10 Virtualization Bandwidth Wi-Fi Business Technology Blockchain Two-factor Authentication Vendor Data Security Apps Mobile Office Gmail Chrome Budget Networking Employer-Employee Relationship Apple Managed Services App BYOD Voice over Internet Protocol Mobile Device Management Tip of the week HIPAA Office 365 Applications WiFi How To BDR Conferencing Hacker Avoiding Downtime Computing Access Control Marketing Information Technology Retail Router Office Tips Analytics Augmented Reality Managed IT Services Big Data Storage Password 2FA Help Desk Bring Your Own Device Computers Healthcare Virtual Private Network Operating System Website Health Risk Management Firewall Document Management Solutions The Internet of Things Scam Data loss Social Windows 11 Monitoring Patch Management Save Money Excel Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Remote Workers Going Green Physical Security Telephone Display Printer Cybercrime Paperless Office Cooperation Free Resource Project Management Infrastructure Windows 7 Microsoft 365 Virtual Desktop Data storage LiFi Maintenance Safety Outlook Employees Antivirus Integration Money Modem Humor User Tip Processor Mobile Security Holidays Sports Mouse Data Storage Smart Technology Supply Chain Video Conferencing Robot Customer Relationship Management Administration Managed Services Provider Virtual Machines Professional Services Saving Time IT Management Managed IT Service Hacking Presentation VPN Meetings Downloads Settings iPhone Wireless Technology Printing Licensing Wireless Content Filtering Computer Repair Entertainment Vulnerabilities YouTube Data Privacy Images 101 Cryptocurrency Word Multi-Factor Authentication Mobility Telephone System Cost Management Machine Learning Public Speaking Google Wallet Lenovo Content Remote Working Wearable Technology Memory Vendors Writing Motherboard Data Breach Virtual Reality Comparison Google Play Be Proactive Lithium-ion battery Health IT Directions Videos Windows 8 Entrepreneur Server Management Assessment Electronic Health Records Laptop Private Cloud Permissions Workforce Drones Superfish Identity Theft Wasting Time Threats Trend Micro Twitter Specifications Security Cameras Workplace Strategies Undo Microchip Internet Exlporer Software as a Service Halloween Error Fraud Meta Social Engineering Username Managing Costs Amazon eCommerce Remote Computing Black Friday SSID Hacks Database Surveillance Scary Stories Virtual Assistant Outsource IT Media Tablet IT Technicians Virtual Machine Environment Fun Cookies Alert Cyber Monday Medical IT Application Proxy Server Reviews Deep Learning Managed IT Tactics Development File Sharing Hotspot Transportation Small Businesses Dark Data How To IBM Education Mirgation Hypervisor Displays Nanotechnology Optimization Notifications PowerPoint Shopping Mobile Computing Addiction Travel Language Employer/Employee Relationships Outsourcing Navigation Techology Management PCI DSS Google Maps Chatbots Search Best Practice Screen Reader Distributed Denial of Service Workplace Gig Economy Competition Service Level Agreement Internet Service Provider Buisness Unified Threat Management Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Legal Unified Threat Management Regulations Compliance IT solutions Identity Business Growth Smart Tech Memes Co-managed IT Bookmark Download Net Neutrality Alerts SQL Server Technology Care Network Congestion Cortana Business Communications User User Error Financial Data History Browsers Smartwatch Alt Codes Connectivity IT Break Fix Scams Upload Procurement Downtime Point of Sale Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources IP Address Social Network Telework Hosted Solution CES Typing Network Management IoT Communitications Tech Support Dark Web Cables Trends Supply Chain Management Monitors Regulations Knowledge Google Calendar Term Google Apps Google Drive Recovery Customer Resource management FinTech Data Analysis Star Wars IT Assessment Websites Microsoft Excel IT Maintenance Hard Drives Domains Gamification Flexibility Staff Value Business Intelligence 5G Social Networking Experience Electronic Medical Records Legislation Shortcuts Google Docs SharePoint Organization Unified Communications Fileless Malware Digital Security Cameras Bitcoin Smart Devices Running Cable Ransmoware Refrigeration

Blog Archive