Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Information Artificial Intelligence Facebook Miscellaneous Holiday Covid-19 Cloud Computing Gadgets Training Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Tip of the week Mobile Device Management Chrome Budget Networking Gmail WiFi Apple App BYOD Employer-Employee Relationship Managed Services Voice over Internet Protocol Computing Access Control Hacker Information Technology Avoiding Downtime HIPAA Marketing Office 365 Applications How To BDR Conferencing Health Computers Risk Management Website Retail Office Tips Router 2FA Analytics Augmented Reality Managed IT Services Storage Password Bring Your Own Device Help Desk Big Data Virtual Private Network Operating System Healthcare Customer Service Cooperation Paperless Office Infrastructure Free Resource Project Management Document Management Windows 7 Windows 11 Microsoft 365 Solutions Scam Data loss Excel Firewall Monitoring Patch Management The Internet of Things Save Money Remote Monitoring Vulnerability End of Support Vendor Management Social Going Green Telephone Physical Security Display Remote Workers Printer Cybercrime YouTube iPhone Hacking Cryptocurrency Presentation Vulnerabilities Telephone System Machine Learning Cost Management Wireless Technology Images 101 Virtual Desktop Data storage LiFi Multi-Factor Authentication Mobility Maintenance Outlook Word Antivirus Supply Chain Money User Tip Modem Humor Mobile Security Employees Processor Integration Sports Safety Mouse Smart Technology Holidays Robot Administration Data Storage Saving Time Data Privacy Video Conferencing IT Management Managed Services Provider Managed IT Service VPN Virtual Machines Meetings Professional Services Downloads Settings Customer Relationship Management Licensing Printing Wireless Content Filtering Computer Repair Entertainment Monitors Workforce Smartwatch IT Trends Knowledge Customer Resource management Azure Threats Regulations Google Calendar Google Drive Procurement Telework Data Analysis Cyber security Websites Star Wars Tech Workplace Strategies Microsoft Excel Meta Staff User CES Communitications 5G Gamification Experience Electronic Medical Records Amazon Social Networking Legislation Google Docs SharePoint Unified Communications Supply Chain Management Bitcoin FinTech Running Cable Fileless Malware Term Writing IP Address Outsource IT Wearable Technology Google Wallet Lenovo IT Assessment Content Flexibility Health IT Value Virtual Reality Environment Motherboard Media Comparison Windows 8 Organization Server Management Laptop Directions Private Cloud Assessment Permissions Small Businesses Recovery Drones Digital Security Cameras Superfish Smart Devices Identity Theft Remote Working Memory Twitter Displays Hard Drives Specifications Halloween Microchip Data Breach Error Internet Exlporer Google Play Domains Fraud Username Social Engineering Outsourcing Videos Electronic Health Records Wasting Time Remote Computing Refrigeration Black Friday Hacks Scary Stories Trend Micro Database Security Cameras Public Speaking Workplace Lithium-ion battery Hiring/Firing IT Technicians Software as a Service Tablet Fun Deep Learning Proxy Server Managing Costs Alert Cookies Paperless Cyber Monday Entrepreneur Hotspot Managed IT eCommerce File Sharing Tactics SSID Dark Data Co-managed IT Virtual Assistant How To Technology Care Mirgation Education Surveillance Virtual Machine Notifications Nanotechnology Undo Business Communications Scams Language Mobile Computing Reviews Travel Addiction Medical IT Search Management Transportation Hybrid Work Chatbots Techology Development Google Maps Best Practice Hypervisor Screen Reader Human Resources Distributed Denial of Service Cables Computing Infrastructure Shopping Buisness Optimization Unified Threat Management Service Level Agreement PowerPoint Employer/Employee Relationships Identity Application Legal Unified Threat Management IT solutions Business Growth PCI DSS Bookmark Smart Tech Navigation Google Apps IBM IT Maintenance Alerts Gig Economy Download Network Congestion Cortana Teamwork Business Intelligence User Error Internet Service Provider Alt Codes Regulations Compliance Browsers Connectivity Evernote Shortcuts Break Fix Ransmoware Downtime Memes Point of Sale Upload Social Network SQL Server Vendors Multi-Factor Security Hosted Solution Net Neutrality Typing Financial Data Network Management History Tech Support IoT Competition Be Proactive Dark Web

Blog Archive