Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Data Recovery Disaster Recovery Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Virtualization Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office Vendor Gmail Apple WiFi BYOD App Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Mobile Device Management Budget Networking How To BDR Conferencing Computing Access Control Hacker Information Technology Avoiding Downtime HIPAA Office 365 Marketing Applications Storage Password Help Desk Bring Your Own Device Big Data Virtual Private Network Healthcare Operating System Health Computers Risk Management Website 2FA Retail Router Analytics Office Tips Augmented Reality Managed IT Services Monitoring Patch Management The Internet of Things Save Money Remote Monitoring Vulnerability End of Support Vendor Management Social Going Green Telephone Remote Workers Physical Security Display Printer Cybercrime Cooperation Customer Service Paperless Office Infrastructure Free Resource Project Management Windows 7 Windows 11 Document Management Microsoft 365 Solutions Excel Scam Data loss Firewall Sports Mouse Holidays Safety Smart Technology Robot Data Storage Administration Saving Time Data Privacy Video Conferencing Managed Services Provider Virtual Machines Professional Services Managed IT Service IT Management VPN Meetings Downloads Settings Licensing Customer Relationship Management Wireless Printing Content Filtering iPhone Computer Repair Entertainment YouTube Vulnerabilities Hacking Presentation Cryptocurrency Telephone System Images 101 Wireless Technology Machine Learning Cost Management Virtual Desktop Multi-Factor Authentication Mobility Data storage LiFi Supply Chain Outlook Maintenance Antivirus Word Money Employees User Tip Humor Modem Integration Processor Mobile Security Alert Entrepreneur Proxy Server Technology Care Cookies Deep Learning Surveillance Cyber Monday Virtual Assistant Managed IT Virtual Machine File Sharing Dark Data Tactics Business Communications Hotspot Scams Reviews Mirgation Education Medical IT How To Notifications Hybrid Work Nanotechnology Development Transportation Undo Hypervisor Travel Addiction Mobile Computing Human Resources Language Management Cables Shopping Chatbots Techology Optimization Search Google Maps PowerPoint Screen Reader Best Practice Distributed Denial of Service Employer/Employee Relationships Computing Infrastructure Buisness Unified Threat Management Navigation Service Level Agreement Google Apps PCI DSS Legal IT Maintenance Gig Economy Identity IT solutions Unified Threat Management Application Bookmark Business Intelligence Smart Tech Business Growth Internet Service Provider Teamwork Alerts IBM Evernote Network Congestion Download Shortcuts Regulations Compliance Ransmoware User Error Memes Cortana Browsers Vendors Connectivity Alt Codes Net Neutrality Break Fix SQL Server Downtime History Point of Sale Upload Be Proactive Financial Data Social Network Workforce Smartwatch Hosted Solution IT Multi-Factor Security Competition Tech Support Threats IoT Typing Procurement Dark Web Network Management Azure Telework Cyber security Tech Monitors Trends Workplace Strategies Customer Resource management Google Drive Meta CES Regulations Communitications Google Calendar Knowledge Websites Data Analysis Amazon Star Wars Supply Chain Management Microsoft Excel FinTech Staff 5G Term User Gamification Google Docs Outsource IT Social Networking Unified Communications SharePoint IT Assessment Legislation Experience Electronic Medical Records Value Fileless Malware Environment Bitcoin Media Flexibility Running Cable Organization Wearable Technology Lenovo IP Address Writing Content Google Wallet Virtual Reality Health IT Small Businesses Digital Security Cameras Motherboard Smart Devices Comparison Server Management Memory Private Cloud Directions Displays Assessment Windows 8 Remote Working Permissions Laptop Superfish Data Breach Identity Theft Google Play Recovery Drones Twitter Outsourcing Videos Electronic Health Records Specifications Hard Drives Wasting Time Domains Error Microchip Internet Exlporer Fraud Halloween Workplace Trend Micro Security Cameras Social Engineering Username Remote Computing Hiring/Firing Software as a Service Black Friday Refrigeration Scary Stories Managing Costs Public Speaking Database Hacks Paperless Co-managed IT IT Technicians eCommerce Lithium-ion battery Fun Tablet SSID

Blog Archive