Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money AI Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Covid-19 Gadgets Cloud Computing Training Managed Service Provider Outsourced IT Remote Work Server IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Marketing Access Control Office 365 Password HIPAA Managed IT Services How To Applications BDR Computing Hacker Physical Security Conferencing Information Technology Avoiding Downtime Website Health Analytics Office Tips Augmented Reality Retail Storage Bring Your Own Device Router Big Data 2FA Help Desk Operating System Computers Virtual Private Network Risk Management Healthcare Paperless Office Infrastructure Cooperation Free Resource Project Management Firewall Document Management Windows 7 Microsoft 365 Solutions The Internet of Things Scam Data loss Social Going Green Patch Management Windows 11 Save Money Monitoring Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Excel Display Remote Workers Managed IT Service Printer Telephone Virtual Desktop iPhone LiFi Licensing Data storage Word Entertainment Vulnerabilities Data Privacy Outlook Machine Learning Images 101 Money Humor Telephone System Multi-Factor Authentication Mobility Cost Management Maintenance Safety Antivirus Sports Mouse Employees Administration Integration User Tip Modem Mobile Security Processor Robot Holidays Customer Relationship Management Data Storage Settings Wireless Printing Smart Technology Supply Chain Content Filtering Video Conferencing IT Management Managed Services Provider Hacking Saving Time VPN Virtual Machines YouTube Meetings Professional Services Presentation Cryptocurrency Wireless Technology Computer Repair Downloads Monitors Browsers Smartwatch Google Wallet Connectivity IT Break Fix Scams Azure Hybrid Work Recovery Upload Procurement Social Network Telework Windows 8 Cyber security Laptop Websites Multi-Factor Security Tech Human Resources Hard Drives CES Drones IoT Communitications Dark Web Cables Domains Electronic Medical Records SharePoint Trends Supply Chain Management Customer Resource management FinTech Regulations Halloween Google Calendar Term Google Apps Refrigeration Public Speaking Writing Data Analysis Lenovo Star Wars IT Assessment Microsoft Excel IT Maintenance Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Virtual Reality Entrepreneur Organization Hacks Server Management Social Networking Scary Stories Private Cloud Legislation Shortcuts Identity Theft Ransmoware Fun Fileless Malware Digital Security Cameras Superfish Smart Devices Content Remote Working Deep Learning Wearable Technology Memory Vendors Twitter Health IT Motherboard Data Breach Error Comparison Google Play Be Proactive Undo Education Permissions Workforce Social Engineering Directions Videos Assessment Electronic Health Records Wasting Time Threats Remote Computing Mobile Computing Trend Micro Specifications Security Cameras Workplace Strategies Tablet Fraud Meta Search Microchip Internet Exlporer Software as a Service Username Best Practice Managing Costs Amazon Alert Application Dark Data Managed IT eCommerce Buisness File Sharing Black Friday SSID IT solutions Virtual Assistant Outsource IT IBM How To Legal Database Surveillance Business Growth IT Technicians Virtual Machine Environment Notifications Media Proxy Server Reviews Cookies Travel Cyber Monday Medical IT Google Maps Hotspot Transportation Small Businesses Cortana Techology Tactics Development Alt Codes Mirgation Hypervisor Displays Shopping Nanotechnology Optimization Downtime Unified Threat Management PowerPoint Competition Hosted Solution Language Employer/Employee Relationships Outsourcing Unified Threat Management Addiction Management PCI DSS Typing Chatbots Navigation Network Congestion Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Knowledge User Google Drive User Error Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless 5G Bookmark Smart Tech Memes Point of Sale Co-managed IT Unified Communications Alerts SQL Server Technology Care IP Address Experience Google Docs Download Net Neutrality Financial Data Bitcoin Network Management History Running Cable Tech Support Business Communications

Blog Archive