Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Saving Money AI Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Holiday Facebook Automation Miscellaneous Artificial Intelligence Training Gadgets Covid-19 Compliance Cloud Computing Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Blockchain Windows 10 Business Technology Virtualization Wi-Fi Bandwidth Managed Services Vendor Apps Two-factor Authentication Data Security Mobile Office Mobile Device Management Voice over Internet Protocol Gmail Apple WiFi App Tip of the week Employer-Employee Relationship Networking Chrome Budget BYOD Password Physical Security HIPAA Access Control Applications Computing Information Technology Conferencing Managed IT Services How To Hacker BDR Office 365 Avoiding Downtime Marketing Storage Virtual Private Network Bring Your Own Device Healthcare Router Health Big Data 2FA Operating System Retail Help Desk Risk Management Computers Office Tips Analytics Website Augmented Reality Firewall Display Remote Workers Printer Paperless Office Infrastructure The Internet of Things Free Resource Going Green Windows 11 Project Management Document Management Social Windows 7 Monitoring Cybercrime Excel Microsoft 365 Scam Solutions Data loss Customer Service Managed IT Service Telephone Patch Management Save Money Remote Monitoring Cooperation End of Support Vulnerability Vendor Management Virtual Machines VPN Telephone System Professional Services Meetings Cost Management Sports Mouse Computer Repair Administration Safety iPhone Modem User Tip Vulnerabilities Processor Mobile Security Machine Learning Settings Images 101 Printing Wireless Supply Chain Multi-Factor Authentication Mobility Content Filtering Smart Technology Maintenance YouTube Antivirus Customer Relationship Management Cryptocurrency Saving Time Employees Hacking Integration Presentation Virtual Desktop Downloads Data storage LiFi Wireless Technology Licensing Robot Data Privacy Holidays Outlook Entertainment Money Data Storage Humor Video Conferencing Managed Services Provider IT Management Word Network Congestion Legislation Vendors Gig Economy Deep Learning Social Networking Refrigeration Be Proactive Internet Service Provider User Error Fileless Malware Teamwork Regulations Compliance Content Public Speaking Evernote Education Wearable Technology Workforce Comparison Threats Memes Health IT Lithium-ion battery Point of Sale Motherboard SQL Server Mobile Computing Assessment Permissions Entrepreneur Workplace Strategies Net Neutrality Directions Financial Data History Network Management Tech Support Search Meta Monitors Specifications Amazon Smartwatch IT Best Practice Microchip Azure Internet Exlporer Undo Buisness Fraud Procurement Outsource IT Telework Cyber security Legal Username Tech IT solutions Websites Black Friday Environment CES Media Communitications Business Growth SharePoint Database Electronic Medical Records Supply Chain Management Small Businesses FinTech Term IT Technicians Cortana Cookies Application Writing Cyber Monday Displays IT Assessment Lenovo Proxy Server Alt Codes Value Tactics Downtime Virtual Reality Hotspot Flexibility Outsourcing Organization Server Management IBM Hosted Solution Private Cloud Mirgation Identity Theft Nanotechnology Digital Security Cameras Smart Devices Superfish Typing Memory Addiction Twitter Language Workplace Remote Working Hiring/Firing Data Breach Google Drive Management Google Play Error Chatbots Knowledge Screen Reader Social Engineering Distributed Denial of Service Videos Paperless Electronic Health Records Wasting Time Service Level Agreement Competition Remote Computing Computing Infrastructure 5G Co-managed IT Experience Technology Care Trend Micro Google Docs Security Cameras Unified Communications Identity Bitcoin Tablet Smart Tech Running Cable Business Communications Software as a Service Bookmark Managing Costs Google Wallet Download Alert Alerts Scams Dark Data Hybrid Work eCommerce Managed IT SSID File Sharing User Windows 8 Connectivity Laptop How To Break Fix Human Resources Surveillance Browsers Virtual Assistant Virtual Machine Drones Upload Notifications Cables Multi-Factor Security Reviews Social Network IP Address Medical IT Travel Google Maps IoT Halloween Dark Web Google Apps Development Techology Transportation Hypervisor Trends IT Maintenance Google Calendar Business Intelligence Shopping Optimization Customer Resource management PowerPoint Unified Threat Management Regulations Recovery Hacks Star Wars Hard Drives Scary Stories Microsoft Excel Shortcuts Unified Threat Management Data Analysis Employer/Employee Relationships Gamification Domains Navigation Staff Fun Ransmoware PCI DSS

Blog Archive