Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Blockchain Data Security Vendor Mobile Office Two-factor Authentication Managed Services Apps App Mobile Device Management BYOD Gmail WiFi Voice over Internet Protocol Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking Avoiding Downtime How To HIPAA BDR Marketing Applications Computing Physical Security Information Technology Conferencing Access Control Office 365 Hacker Managed IT Services Website Router Operating System 2FA Help Desk Risk Management Virtual Private Network Health Big Data Healthcare Analytics Office Tips Augmented Reality Retail Storage Password Computers Bring Your Own Device Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Firewall Cybercrime Monitoring Display Excel Printer The Internet of Things Paperless Office Managed IT Service Infrastructure Remote Workers Social Telephone Document Management Cooperation Free Resource Project Management Windows 7 Customer Service Scam Microsoft 365 Data loss Employees Integration Robot User Tip Modem Word Mobile Security Settings Processor Wireless Printing Content Filtering Holidays IT Management YouTube Meetings Data Storage VPN Smart Technology Supply Chain Safety Video Conferencing Cryptocurrency Managed Services Provider Professional Services Computer Repair Saving Time Virtual Machines Virtual Desktop Data storage LiFi Downloads Outlook iPhone Licensing Machine Learning Money Humor Vulnerabilities Entertainment Customer Relationship Management Data Privacy Maintenance Images 101 Sports Hacking Antivirus Mouse Mobility Telephone System Presentation Multi-Factor Authentication Cost Management Administration Wireless Technology Assessment Electronic Health Records Permissions Workforce Best Practice Alert Directions Videos IP Address Buisness File Sharing Dark Data Wasting Time Threats Managed IT Legal Specifications Security Cameras Workplace Strategies IT solutions How To Trend Micro Internet Exlporer Software as a Service Recovery Fraud Meta Business Growth Notifications Microchip Travel Username Hard Drives Managing Costs Amazon Techology Black Friday SSID Google Maps Cortana Domains eCommerce Database Surveillance Virtual Assistant Outsource IT Alt Codes Downtime Unified Threat Management Refrigeration IT Technicians Virtual Machine Environment Media Unified Threat Management Cyber Monday Medical IT Hosted Solution Proxy Server Reviews Public Speaking Cookies Lithium-ion battery Tactics Development Hotspot Transportation Small Businesses Typing Network Congestion Mirgation Hypervisor Displays Entrepreneur Google Drive User Error PowerPoint Knowledge Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Point of Sale 5G Management PCI DSS Undo Chatbots Navigation Google Docs Distributed Denial of Service Workplace Unified Communications Experience Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support Monitors Regulations Compliance Identity Google Wallet Evernote Paperless Co-managed IT Bookmark Smart Tech Memes Download Net Neutrality Application Alerts SQL Server Technology Care Windows 8 Laptop Websites Financial Data History Drones Business Communications Connectivity IT SharePoint Break Fix Scams Electronic Medical Records Browsers Smartwatch IBM Upload Procurement Azure Hybrid Work Halloween Multi-Factor Security Tech Human Resources Writing Social Network Telework Cyber security Lenovo IoT Communitications Dark Web Cables Virtual Reality CES Trends Supply Chain Management Hacks Server Management Scary Stories Private Cloud Superfish Google Calendar Term Google Apps Identity Theft Fun Customer Resource management FinTech Competition Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Deep Learning Twitter Data Analysis Error Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Education Social Engineering Organization Social Networking Smart Devices User Ransmoware Remote Computing Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Mobile Computing Comparison Google Play Be Proactive Tablet Search Health IT Motherboard Data Breach

Blog Archive