Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Small Business Hosted Solutions Collaboration Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips AI Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Holiday Facebook Automation Miscellaneous Artificial Intelligence Training Covid-19 Gadgets Compliance Cloud Computing Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Virtualization Business Technology Bandwidth Wi-Fi Blockchain Windows 10 Two-factor Authentication Vendor Apps Managed Services Data Security Mobile Office Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Budget Voice over Internet Protocol Apple Networking App Mobile Device Management BYOD Information Technology HIPAA Access Control Applications Office 365 Password Conferencing Hacker Managed IT Services How To BDR Avoiding Downtime Marketing Computing Physical Security Risk Management Virtual Private Network Router Health Big Data Analytics Office Tips Augmented Reality 2FA Retail Help Desk Storage Bring Your Own Device Computers Healthcare Website Operating System Display Solutions Printer The Internet of Things Paperless Office Infrastructure Social Document Management Windows 11 Monitoring Excel Customer Service Scam Data loss Remote Workers Managed IT Service Telephone Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring End of Support Project Management Vulnerability Windows 7 Vendor Management Cybercrime Firewall Microsoft 365 Cryptocurrency Safety Computer Repair Virtual Desktop Employees Integration Data storage LiFi User Tip Modem Mobile Security Outlook Processor Machine Learning Holidays Money Humor Data Storage Customer Relationship Management Smart Technology Supply Chain Maintenance Video Conferencing Managed Services Provider Antivirus Sports Saving Time Virtual Machines Professional Services Mouse Hacking Presentation Administration Downloads Wireless Technology iPhone Licensing Robot Entertainment Vulnerabilities Data Privacy Settings Word Wireless Printing Content Filtering Images 101 IT Management YouTube Meetings Telephone System Multi-Factor Authentication Mobility VPN Cost Management Content Remote Working Wearable Technology Memory Vendors Entrepreneur Point of Sale 5G Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Google Docs Unified Communications Experience Directions Videos Assessment Electronic Health Records Wasting Time Threats Bitcoin Network Management Undo Running Cable Tech Support Monitors Trend Micro Specifications Security Cameras Workplace Strategies Google Wallet Fraud Meta Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Windows 8 Laptop Websites eCommerce Black Friday SSID Drones Virtual Assistant Outsource IT SharePoint Application Electronic Medical Records Database Surveillance IT Technicians Virtual Machine Environment Media Halloween IBM Writing Proxy Server Reviews Cookies Cyber Monday Medical IT Lenovo Hotspot Transportation Small Businesses Virtual Reality Tactics Development Mirgation Hypervisor Displays Hacks Server Management Scary Stories Private Cloud Identity Theft Fun Shopping Nanotechnology Optimization PowerPoint Superfish Language Employer/Employee Relationships Outsourcing Deep Learning Twitter Addiction Management PCI DSS Chatbots Navigation Competition Error Education Social Engineering Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Remote Computing Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Mobile Computing Tablet User Search Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Best Practice Alert Download Net Neutrality Dark Data Financial Data History Business Communications Managed IT Buisness File Sharing IP Address IT solutions How To Browsers Smartwatch Connectivity IT Break Fix Scams Legal Azure Hybrid Work Business Growth Notifications Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Travel Techology Google Maps Recovery Cortana CES IoT Communitications Dark Web Cables Trends Supply Chain Management Alt Codes Hard Drives Downtime Unified Threat Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Domains Microsoft Excel IT Maintenance Unified Threat Management Hosted Solution Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Typing Refrigeration Network Congestion Organization Social Networking Legislation Shortcuts Public Speaking Ransmoware Google Drive User Error Lithium-ion battery Knowledge Fileless Malware Digital Security Cameras Smart Devices

Blog Archive