Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office Vendor Apple Networking WiFi App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail How To BDR Conferencing Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Applications 2FA Help Desk Managed IT Services Big Data Healthcare Operating System Physical Security Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Augmented Reality Router Retail Storage Password Bring Your Own Device Monitoring The Internet of Things Excel Social Going Green Patch Management Remote Workers Save Money Remote Monitoring End of Support Vulnerability Telephone Vendor Management Cybercrime Customer Service Cooperation Free Resource Display Project Management Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Solutions Document Management Firewall Windows 11 Scam Data loss Safety Data Storage Administration Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Managed IT Service Settings Wireless Downloads Printing Content Filtering iPhone IT Management Customer Relationship Management Licensing VPN YouTube Meetings Entertainment Vulnerabilities Cryptocurrency Data Privacy Hacking Images 101 Presentation Computer Repair Multi-Factor Authentication Mobility Virtual Desktop Telephone System LiFi Wireless Technology Cost Management Data storage Outlook Machine Learning Employees Money Word Integration Humor User Tip Modem Maintenance Processor Mobile Security Antivirus Sports Holidays Mouse Mirgation Hypervisor Displays Mobile Computing Tablet Shopping Undo Search Nanotechnology Optimization PowerPoint Best Practice Alert Addiction Language Employer/Employee Relationships Outsourcing Dark Data Chatbots Navigation Managed IT Buisness File Sharing Management PCI DSS IT solutions Gig Economy How To Screen Reader Distributed Denial of Service Workplace Legal Business Growth Notifications Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Travel Regulations Compliance Application Google Maps Bookmark Cortana Smart Tech Memes Co-managed IT Techology Alt Codes IBM Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Downtime Unified Threat Management Financial Data Hosted Solution Browsers Smartwatch Connectivity IT Break Fix Scams Unified Threat Management Typing Upload Procurement Azure Hybrid Work Network Congestion Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES Competition Knowledge IoT Communitications Dark Web Cables Google Drive User Error Trends Supply Chain Management 5G Regulations Google Calendar Term Google Apps Point of Sale Customer Resource management FinTech Unified Communications Data Analysis Experience Star Wars IT Assessment Microsoft Excel IT Maintenance Google Docs Bitcoin Network Management Running Cable Tech Support Gamification Flexibility User Staff Value Business Intelligence Monitors Social Networking Legislation Shortcuts Google Wallet Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Windows 8 IP Address Laptop Websites Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Drones Health IT Directions Videos Electronic Medical Records Assessment Electronic Health Records Permissions Workforce SharePoint Halloween Recovery Wasting Time Threats Hard Drives Writing Trend Micro Specifications Security Cameras Workplace Strategies Lenovo Microchip Domains Virtual Reality Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Hacks Server Management Scary Stories Private Cloud Username Refrigeration Fun eCommerce Black Friday SSID Superfish Identity Theft Deep Learning Public Speaking Twitter Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Lithium-ion battery Error Education Proxy Server Reviews Social Engineering Cookies Entrepreneur Cyber Monday Medical IT Remote Computing Tactics Development Hotspot Transportation Small Businesses

Blog Archive