Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Smartphone Data Backup Android Upgrade VoIP Business Management AI Smartphones Mobile Devices Data Recovery communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Information Artificial Intelligence Facebook Automation Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Employee/Employer Relationship IT Support Encryption Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Virtualization Blockchain Wi-Fi Apps Vendor Two-factor Authentication Data Security Mobile Office Employer-Employee Relationship Networking Chrome Budget BYOD Mobile Device Management Managed Services Voice over Internet Protocol Apple Gmail App Tip of the week Information Technology HIPAA Applications How To Hacker Office 365 BDR Avoiding Downtime Marketing Conferencing Access Control WiFi Computing Risk Management Router Managed IT Services Computers Analytics Office Tips Augmented Reality Help Desk Website 2FA Storage Password Bring Your Own Device Virtual Private Network Healthcare Health Big Data Operating System Retail Solutions Scam Data loss Customer Service Patch Management Monitoring Save Money Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Excel Physical Security Remote Workers Firewall Display Telephone Printer Paperless Office Infrastructure Free Resource Cooperation The Internet of Things Going Green Project Management Windows 7 Social Document Management Microsoft 365 Cybercrime Maintenance Cryptocurrency Antivirus Customer Relationship Management Employees Integration Virtual Desktop Modem Data storage Hacking LiFi User Tip Processor Mobile Security Presentation Outlook Holidays Wireless Technology Money Data Storage Robot Smart Technology Humor Video Conferencing Managed Services Provider Professional Services Saving Time Virtual Machines Word Sports IT Management Supply Chain Mouse VPN Meetings Managed IT Service Downloads Administration iPhone Computer Repair Licensing Safety Vulnerabilities Entertainment Images 101 Settings Wireless Machine Learning Printing Mobility Content Filtering Telephone System Data Privacy Multi-Factor Authentication Cost Management YouTube Electronic Health Records Assessment Shortcuts Twitter Permissions Videos Directions 5G Ransmoware Wasting Time Error Security Cameras Social Engineering Specifications Google Docs Unified Communications Experience Vendors Trend Micro Running Cable Microchip Software as a Service Internet Exlporer Be Proactive Remote Computing Fraud Competition Bitcoin Google Wallet Username Workforce Managing Costs SSID Black Friday Threats eCommerce Tablet Laptop Surveillance Database Workplace Strategies Virtual Assistant Alert Windows 8 Drones User Managed IT Meta Virtual Machine File Sharing IT Technicians Dark Data Cookies Medical IT How To Cyber Monday Reviews Proxy Server Amazon Halloween Development Tactics Transportation Notifications Hotspot IP Address Outsource IT Hypervisor Travel Mirgation Nanotechnology Media PowerPoint Shopping Techology Environment Optimization Google Maps Scary Stories Addiction Employer/Employee Relationships Language Hacks Recovery PCI DSS Fun Management Small Businesses Unified Threat Management Chatbots Navigation Screen Reader Distributed Denial of Service Hard Drives Deep Learning Gig Economy Unified Threat Management Displays Internet Service Provider Service Level Agreement Teamwork Computing Infrastructure Domains Network Congestion Education Regulations Compliance Outsourcing Identity Evernote Smart Tech Refrigeration User Error Bookmark Memes Net Neutrality Download Workplace SQL Server Alerts Public Speaking Mobile Computing Lithium-ion battery Financial Data Search Hiring/Firing History Point of Sale IT Connectivity Paperless Break Fix Best Practice Smartwatch Entrepreneur Browsers Buisness Procurement Network Management Upload Co-managed IT Azure Tech Support Tech Monitors Multi-Factor Security Legal IT solutions Telework Social Network Technology Care Cyber security Communitications IoT Business Communications Dark Web Undo Business Growth CES Supply Chain Management Trends Scams Websites Term Google Calendar FinTech Cortana Customer Resource management Hybrid Work Regulations IT Assessment Star Wars Human Resources Electronic Medical Records Microsoft Excel Alt Codes SharePoint Data Analysis Downtime Flexibility Gamification Cables Value Staff Writing Legislation Application Hosted Solution Organization Lenovo Social Networking Smart Devices Google Apps Virtual Reality Typing Digital Security Cameras Fileless Malware Remote Working Server Management Content IT Maintenance Memory Private Cloud Wearable Technology IBM Google Play Comparison Google Drive Superfish Knowledge Health IT Business Intelligence Data Breach Identity Theft Motherboard

Blog Archive