Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Email Google Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Productivity Microsoft Managed Service Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Information Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Blockchain Bandwidth Virtualization Data Security Mobile Office Two-factor Authentication Vendor Apps App BYOD Managed Services Voice over Internet Protocol Mobile Device Management Gmail Tip of the week Chrome Budget WiFi Apple Networking Employer-Employee Relationship BDR Hacker Computing Conferencing Avoiding Downtime Information Technology Marketing Access Control Office 365 HIPAA Applications How To 2FA Help Desk Computers Operating System Physical Security Website Virtual Private Network Risk Management Healthcare Health Analytics Office Tips Augmented Reality Retail Storage Big Data Password Router Bring Your Own Device Managed IT Services Windows 11 Customer Service Monitoring Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Excel Vendor Management Cybercrime Remote Workers Telephone Display Printer Paperless Office Infrastructure Firewall Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 The Internet of Things Solutions Scam Social Data loss Holidays Data Storage Robot Hacking Smart Technology Supply Chain Presentation Video Conferencing Settings Printing Managed Services Provider Wireless Saving Time Virtual Machines Content Filtering Professional Services IT Management Wireless Technology VPN YouTube Meetings Managed IT Service Cryptocurrency Downloads iPhone Computer Repair Word Licensing Virtual Desktop Vulnerabilities Data storage Entertainment LiFi Data Privacy Outlook Images 101 Machine Learning Money Safety Telephone System Multi-Factor Authentication Mobility Humor Cost Management Maintenance Sports Antivirus Mouse Employees Integration User Tip Administration Modem Mobile Security Processor Customer Relationship Management Legal Proxy Server Reviews IT solutions Cookies How To Cyber Monday Medical IT Hotspot Transportation Small Businesses Business Growth Competition Tactics Development Notifications Travel Mirgation Hypervisor Displays Techology Shopping Google Maps Nanotechnology Optimization Cortana PowerPoint Language Employer/Employee Relationships Outsourcing Alt Codes Addiction Management PCI DSS Downtime Unified Threat Management User Chatbots Navigation Unified Threat Management Gig Economy Hosted Solution Screen Reader Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Typing IP Address Regulations Compliance Identity Network Congestion Evernote Paperless Co-managed IT Google Drive User Error Bookmark Smart Tech Memes Knowledge Download Net Neutrality Alerts SQL Server Technology Care Financial Data Point of Sale Recovery History 5G Business Communications Break Fix Scams Google Docs Browsers Smartwatch Unified Communications Hard Drives Connectivity IT Experience Upload Procurement Running Cable Tech Support Azure Hybrid Work Bitcoin Network Management Domains Google Wallet Social Network Telework Cyber security Monitors Multi-Factor Security Tech Human Resources Dark Web Cables CES Refrigeration IoT Communitications Trends Supply Chain Management Laptop Websites Windows 8 Public Speaking Drones Lithium-ion battery Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance SharePoint Data Analysis Star Wars IT Assessment Electronic Medical Records Entrepreneur Gamification Flexibility Halloween Staff Value Business Intelligence Lenovo Organization Social Networking Writing Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras Undo Smart Devices Virtual Reality Content Remote Working Scary Stories Private Cloud Wearable Technology Memory Vendors Hacks Server Management Superfish Health IT Identity Theft Motherboard Data Breach Fun Comparison Google Play Be Proactive Permissions Workforce Directions Videos Deep Learning Assessment Electronic Health Records Twitter Error Wasting Time Threats Education Application Trend Micro Social Engineering Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Internet Exlporer Software as a Service Remote Computing IBM Username Managing Costs Amazon Mobile Computing Tablet eCommerce Search Black Friday SSID Virtual Assistant Outsource IT Best Practice Database Surveillance Alert Buisness File Sharing IT Technicians Virtual Machine Environment Dark Data Media Managed IT

Blog Archive