Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Facebook Automation Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Business Technology Virtualization Data Security Two-factor Authentication Mobile Office Vendor Apps Networking BYOD Mobile Device Management Chrome Gmail Budget WiFi Tip of the week Apple Managed Services App Voice over Internet Protocol Employer-Employee Relationship Computing How To Hacker BDR Information Technology Avoiding Downtime Marketing HIPAA Office 365 Applications Access Control Conferencing Operating System Managed IT Services Computers Risk Management Website Router Analytics Office Tips Physical Security Augmented Reality Virtual Private Network Storage Health Password Help Desk Bring Your Own Device 2FA Big Data Retail Healthcare Customer Service Cybercrime Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Display Printer Paperless Office Infrastructure Monitoring Windows 11 The Internet of Things Social Document Management Excel Remote Workers Going Green Telephone Scam Data loss Content Filtering Entertainment Hacking Vulnerabilities Presentation YouTube Images 101 Data Privacy Cryptocurrency Wireless Technology Telephone System Multi-Factor Authentication Robot Mobility Cost Management Virtual Desktop Data storage LiFi Word IT Management VPN Employees Meetings Outlook Integration Money User Tip Modem Humor Processor Computer Repair Mobile Security Safety Holidays Sports Data Storage Mouse Smart Technology Video Conferencing Supply Chain Machine Learning Managed Services Provider Administration Saving Time Virtual Machines Professional Services Managed IT Service Maintenance Antivirus Customer Relationship Management Downloads Settings iPhone Licensing Printing Wireless Social Network Telework Scams Cyber security Multi-Factor Security Tech Hosted Solution CES Hybrid Work Tablet IoT Communitications Dark Web Typing Alert Trends Supply Chain Management Human Resources Managed IT Customer Resource management FinTech Cables File Sharing Regulations Google Drive User Dark Data Google Calendar Term Knowledge Data Analysis Star Wars IT Assessment How To Microsoft Excel Notifications Staff Value 5G Gamification Flexibility Google Apps Organization IT Maintenance IP Address Travel Social Networking Google Docs Legislation Unified Communications Experience Running Cable Techology Fileless Malware Digital Security Cameras Business Intelligence Google Maps Smart Devices Bitcoin Wearable Technology Memory Google Wallet Content Remote Working Shortcuts Health IT Ransmoware Unified Threat Management Motherboard Data Breach Recovery Comparison Google Play Laptop Unified Threat Management Directions Videos Vendors Assessment Electronic Health Records Hard Drives Permissions Windows 8 Be Proactive Domains Wasting Time Drones Workforce Trend Micro Network Congestion Specifications Security Cameras Halloween User Error Microchip Threats Internet Exlporer Software as a Service Refrigeration Fraud Workplace Strategies Public Speaking Managing Costs Username Meta Lithium-ion battery Point of Sale eCommerce Black Friday SSID Entrepreneur Scary Stories Amazon Database Surveillance Virtual Assistant Hacks Network Management Tech Support IT Technicians Virtual Machine Fun Proxy Server Reviews Outsource IT Cookies Monitors Cyber Monday Medical IT Deep Learning Undo Hotspot Transportation Environment Tactics Development Media Websites Mirgation Hypervisor Education Shopping Small Businesses Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Mobile Computing SharePoint Displays Addiction Management PCI DSS Chatbots Navigation Search Lenovo Gig Economy Outsourcing Screen Reader Application Writing Distributed Denial of Service Best Practice Virtual Reality Computing Infrastructure Teamwork Buisness Service Level Agreement Internet Service Provider Server Management Regulations Compliance Workplace IBM Private Cloud Identity Legal Evernote IT solutions Superfish Bookmark Hiring/Firing Identity Theft Smart Tech Memes Business Growth Twitter Alerts SQL Server Download Net Neutrality Paperless Financial Data Co-managed IT Error History Cortana Browsers Smartwatch Technology Care Connectivity IT Social Engineering Break Fix Alt Codes Competition Remote Computing Azure Downtime Upload Procurement Business Communications

Blog Archive