Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Workplace Tips Privacy Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Automation Artificial Intelligence Information Holiday Facebook Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Virtualization Apps Data Security Mobile Office Vendor Two-factor Authentication Tip of the week Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Budget Networking Apple App Mobile Device Management BYOD Gmail WiFi Office 365 Conferencing Hacker How To Avoiding Downtime BDR Marketing HIPAA Computing Applications Information Technology Access Control Help Desk Office Tips Analytics Augmented Reality Retail 2FA Storage Password Healthcare Computers Bring Your Own Device Managed IT Services Website Operating System Router Physical Security Virtual Private Network Risk Management Big Data Health Monitoring Social Document Management Windows 11 Remote Workers Customer Service Telephone Scam Data loss Excel Cooperation Free Resource Project Management Windows 7 Patch Management Going Green Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Cybercrime Display The Internet of Things Printer Paperless Office Infrastructure Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Saving Time Money Virtual Machines Professional Services Customer Relationship Management Humor Managed IT Service Maintenance Antivirus Supply Chain Sports Hacking Downloads iPhone Mouse Presentation Licensing Wireless Technology Vulnerabilities Entertainment Administration Images 101 Telephone System Multi-Factor Authentication Mobility Robot Word Cost Management Settings Printing Wireless Content Filtering Data Privacy IT Management VPN Employees Meetings YouTube Integration Cryptocurrency Safety User Tip Modem Computer Repair Mobile Security Processor Holidays Virtual Desktop Data storage LiFi Windows 8 Workplace Strategies Websites Mirgation Hypervisor Laptop Application Shopping Drones Meta Nanotechnology Optimization PowerPoint IBM Electronic Medical Records Language Employer/Employee Relationships SharePoint Amazon Addiction Management PCI DSS Chatbots Halloween Navigation Lenovo Gig Economy Outsource IT Screen Reader Distributed Denial of Service Writing Service Level Agreement Internet Service Provider Media Virtual Reality Computing Infrastructure Teamwork Environment Server Management Regulations Compliance Hacks Private Cloud Identity Scary Stories Evernote Fun Superfish Bookmark Small Businesses Identity Theft Smart Tech Memes Competition Download Net Neutrality Deep Learning Twitter Alerts SQL Server Displays Financial Data Error History Social Engineering Break Fix Browsers Smartwatch Outsourcing Connectivity IT Education Upload Procurement Remote Computing Azure User Social Network Telework Mobile Computing Workplace Cyber security Multi-Factor Security Tech Dark Web Search CES Hiring/Firing Tablet IoT Communitications Trends Supply Chain Management Best Practice Paperless IP Address Alert Managed IT Customer Resource management FinTech Co-managed IT File Sharing Regulations Buisness Google Calendar Term Dark Data How To Microsoft Excel Data Analysis Legal Technology Care Star Wars IT Assessment IT solutions Gamification Flexibility Business Growth Business Communications Notifications Staff Value Recovery Organization Scams Travel Social Networking Hard Drives Legislation Domains Cortana Techology Fileless Malware Digital Security Cameras Hybrid Work Google Maps Smart Devices Content Remote Working Alt Codes Human Resources Wearable Technology Memory Health IT Cables Unified Threat Management Motherboard Data Breach Downtime Refrigeration Comparison Google Play Public Speaking Permissions Unified Threat Management Directions Videos Assessment Electronic Health Records Hosted Solution Typing Google Apps Lithium-ion battery Wasting Time Entrepreneur IT Maintenance Trend Micro Specifications Security Cameras Network Congestion Fraud Knowledge User Error Microchip Google Drive Business Intelligence Internet Exlporer Software as a Service Username Shortcuts Managing Costs Ransmoware Point of Sale eCommerce Undo Black Friday SSID 5G Virtual Assistant Experience Google Docs Vendors Database Surveillance Unified Communications Network Management Bitcoin Be Proactive Tech Support IT Technicians Virtual Machine Running Cable Proxy Server Reviews Google Wallet Workforce Cookies Cyber Monday Medical IT Monitors Hotspot Transportation Threats Tactics Development

Blog Archive