Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Disaster Recovery VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Holiday Automation Information Facebook Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Business Technology Wi-Fi Windows 10 Virtualization Apps Mobile Office Vendor Two-factor Authentication Data Security Budget Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Apple App Tip of the week Mobile Device Management Gmail Networking WiFi Chrome Conferencing Hacker Access Control Avoiding Downtime Marketing Computing HIPAA Information Technology Applications Office 365 How To BDR Storage Password Bring Your Own Device Healthcare Virtual Private Network Computers Health Website Operating System Router Retail Risk Management Managed IT Services Analytics Office Tips 2FA Help Desk Augmented Reality Big Data Social Patch Management Save Money Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Telephone Physical Security Customer Service Display Printer Cooperation Free Resource Project Management Windows 7 Paperless Office Going Green Infrastructure Microsoft 365 Cybercrime Solutions Document Management Firewall Scam Data loss Windows 11 Monitoring The Internet of Things Excel Robot Saving Time Virtual Machines Professional Services Managed IT Service Sports Mouse IT Management Downloads Customer Relationship Management iPhone Meetings VPN Licensing Administration Vulnerabilities Hacking Entertainment Data Privacy Presentation Computer Repair Images 101 Wireless Technology Telephone System Settings Multi-Factor Authentication Mobility Wireless Printing Cost Management Content Filtering Machine Learning YouTube Word Cryptocurrency Employees Integration Maintenance User Tip Modem Antivirus Mobile Security Processor Virtual Desktop LiFi Data storage Holidays Safety Data Storage Outlook Smart Technology Supply Chain Money Video Conferencing Managed Services Provider Humor Travel Application Hacks Gig Economy Scary Stories Screen Reader Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Techology Fun Computing Infrastructure Teamwork Hiring/Firing Google Maps Deep Learning Regulations Compliance Identity Evernote Paperless IBM Co-managed IT Unified Threat Management Bookmark Smart Tech Memes Download Net Neutrality Unified Threat Management Alerts SQL Server Technology Care Education Financial Data History Business Communications Break Fix Scams Network Congestion Mobile Computing Browsers Smartwatch Connectivity IT Upload Procurement User Error Search Azure Hybrid Work Competition Best Practice Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Point of Sale CES Buisness IoT Communitications Trends Supply Chain Management Legal IT solutions User Business Growth Customer Resource management FinTech Regulations Network Management Google Calendar Term Google Apps Tech Support Microsoft Excel IT Maintenance Monitors Data Analysis Star Wars IT Assessment Gamification Flexibility Cortana Staff Value Business Intelligence Alt Codes Organization Social Networking Legislation Shortcuts IP Address Websites Ransmoware Fileless Malware Digital Security Cameras Downtime Smart Devices Hosted Solution Content Remote Working SharePoint Wearable Technology Memory Vendors Electronic Medical Records Recovery Typing Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Hard Drives Writing Directions Videos Assessment Electronic Health Records Lenovo Knowledge Wasting Time Threats Domains Virtual Reality Google Drive Trend Micro Server Management Specifications Security Cameras Workplace Strategies Private Cloud 5G Fraud Meta Identity Theft Refrigeration Microchip Internet Exlporer Software as a Service Superfish Unified Communications Username Experience Managing Costs Amazon Public Speaking Twitter Google Docs Bitcoin Running Cable eCommerce Black Friday SSID Lithium-ion battery Error Virtual Assistant Outsource IT Social Engineering Google Wallet Entrepreneur Database Surveillance IT Technicians Virtual Machine Environment Media Remote Computing Windows 8 Proxy Server Reviews Laptop Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Tablet Undo Drones Tactics Development Mirgation Hypervisor Displays Alert File Sharing Dark Data Shopping Halloween Nanotechnology Optimization Managed IT PowerPoint Language Employer/Employee Relationships Outsourcing How To Addiction Management PCI DSS Chatbots Navigation Notifications

Blog Archive