Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade Business Management VoIP Smartphones AI Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Remote Work Managed Service Provider Outsourced IT Encryption Compliance Spam IT Support Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Data Security Apps Two-factor Authentication Vendor Mobile Office App Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Budget Gmail Managed Services Voice over Internet Protocol Apple Networking How To BDR Computing Hacker Information Technology HIPAA Avoiding Downtime Access Control Applications Office 365 Marketing Conferencing WiFi Big Data Healthcare Operating System Computers Virtual Private Network Risk Management Router Health Website Analytics Office Tips Augmented Reality 2FA Retail Help Desk Storage Password Bring Your Own Device Managed IT Services Telephone Social Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource Vulnerability Project Management End of Support Vendor Management Windows 7 Cybercrime Customer Service Physical Security Microsoft 365 Display Solutions Printer Paperless Office Infrastructure Windows 11 Document Management Firewall Monitoring Excel Scam Data loss The Internet of Things Remote Workers Downloads iPhone Licensing Robot Vulnerabilities Entertainment Settings Data Privacy Customer Relationship Management Printing Wireless Content Filtering Images 101 IT Management VPN Telephone System YouTube Meetings Multi-Factor Authentication Mobility Cost Management Hacking Presentation Cryptocurrency Computer Repair Wireless Technology Employees Virtual Desktop LiFi Integration Data storage User Tip Modem Mobile Security Outlook Processor Word Machine Learning Money Holidays Humor Data Storage Smart Technology Supply Chain Maintenance Video Conferencing Antivirus Sports Managed Services Provider Professional Services Safety Mouse Saving Time Virtual Machines Managed IT Service Administration Best Practice Download Net Neutrality Alert Alerts SQL Server Technology Care Managed IT Financial Data Buisness File Sharing History Dark Data Business Communications How To Break Fix Scams Application Legal Browsers Smartwatch IT solutions Connectivity IT Business Growth Upload Procurement Notifications Azure Hybrid Work IBM Social Network Telework Travel Cyber security Multi-Factor Security Tech Human Resources Cortana Dark Web Cables Techology CES Google Maps IoT Communitications Alt Codes Trends Supply Chain Management Customer Resource management FinTech Downtime Unified Threat Management Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Unified Threat Management Data Analysis Hosted Solution Star Wars IT Assessment Typing Gamification Flexibility Staff Value Business Intelligence Competition Organization Social Networking Network Congestion Legislation Shortcuts Smart Devices Knowledge Ransmoware Google Drive User Error Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors 5G Comparison Google Play Be Proactive User Health IT Point of Sale Motherboard Data Breach Unified Communications Assessment Electronic Health Records Experience Permissions Workforce Google Docs Directions Videos Bitcoin Network Management Running Cable Tech Support Wasting Time Threats Monitors Specifications Security Cameras Workplace Strategies IP Address Google Wallet Trend Micro Internet Exlporer Software as a Service Fraud Meta Microchip Windows 8 Username Laptop Websites Managing Costs Amazon Black Friday SSID Recovery Drones eCommerce Database Surveillance Electronic Medical Records Virtual Assistant Outsource IT Hard Drives SharePoint Domains Halloween IT Technicians Virtual Machine Environment Media Writing Cyber Monday Medical IT Lenovo Proxy Server Reviews Cookies Tactics Development Virtual Reality Hotspot Transportation Small Businesses Refrigeration Public Speaking Hacks Server Management Scary Stories Private Cloud Mirgation Hypervisor Displays Fun PowerPoint Lithium-ion battery Superfish Shopping Identity Theft Nanotechnology Optimization Entrepreneur Deep Learning Addiction Twitter Language Employer/Employee Relationships Outsourcing Management PCI DSS Error Chatbots Navigation Social Engineering Distributed Denial of Service Workplace Gig Economy Education Screen Reader Service Level Agreement Internet Service Provider Remote Computing Computing Infrastructure Teamwork Hiring/Firing Undo Mobile Computing Regulations Compliance Identity Evernote Paperless Search Co-managed IT Bookmark Tablet Smart Tech Memes

Blog Archive