Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Ransomware Backup Small Business Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Information Miscellaneous Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Tip of the week Chrome Mobile Device Management Budget Gmail Networking WiFi Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Computing Information Technology Hacker Conferencing Access Control Avoiding Downtime Marketing Office 365 How To HIPAA BDR Applications Operating System Physical Security Help Desk Virtual Private Network Computers Risk Management Health Website Analytics Office Tips Augmented Reality Retail Storage Password 2FA Managed IT Services Bring Your Own Device Router Big Data Healthcare Monitoring Cybercrime Free Resource Customer Service Display Project Management Printer Windows 7 Paperless Office Infrastructure Microsoft 365 Telephone Solutions Document Management Cooperation Firewall Scam Windows 11 Data loss The Internet of Things Excel Social Patch Management Save Money Remote Workers Going Green Remote Monitoring Vulnerability End of Support Vendor Management VPN Content Filtering Meetings Smart Technology Vulnerabilities Data Privacy YouTube Hacking Computer Repair Images 101 Presentation Saving Time Cryptocurrency Multi-Factor Authentication Mobility Managed IT Service Wireless Technology Virtual Desktop Data storage LiFi Downloads Licensing Machine Learning Employees Outlook Word Entertainment Integration Money Humor Maintenance Antivirus Holidays Telephone System Cost Management Sports Mouse Safety Data Storage Supply Chain Video Conferencing Managed Services Provider Administration Virtual Machines Professional Services Robot User Tip Modem Mobile Security Processor Settings iPhone Printing IT Management Wireless Customer Relationship Management Network Congestion Telework Cyber security Hosted Solution Tech Human Resources Mirgation CES Competition Communitications Typing User Error Cables Nanotechnology Addiction Language Supply Chain Management FinTech Google Drive Management Term Google Apps Chatbots Knowledge Point of Sale Distributed Denial of Service IT Assessment IT Maintenance Screen Reader Value Business Intelligence Service Level Agreement Network Management Computing Infrastructure 5G Tech Support Flexibility User Monitors Organization Google Docs Unified Communications Shortcuts Identity Experience Running Cable Digital Security Cameras Smart Devices Bookmark Bitcoin Ransmoware Smart Tech Google Wallet Memory Vendors Download Alerts Websites IP Address Remote Working Data Breach Google Play Be Proactive Connectivity Laptop Break Fix Electronic Medical Records Videos Electronic Health Records Browsers Windows 8 SharePoint Workforce Drones Wasting Time Threats Upload Recovery Multi-Factor Security Writing Hard Drives Trend Micro Social Network Lenovo Security Cameras Workplace Strategies IoT Halloween Dark Web Virtual Reality Domains Software as a Service Meta Managing Costs Amazon Trends Server Management Private Cloud Google Calendar Refrigeration eCommerce Customer Resource management Superfish SSID Regulations Identity Theft Star Wars Scary Stories Microsoft Excel Twitter Public Speaking Surveillance Data Analysis Hacks Virtual Assistant Outsource IT Virtual Machine Environment Gamification Media Staff Fun Error Lithium-ion battery Legislation Social Engineering Reviews Entrepreneur Deep Learning Medical IT Social Networking Remote Computing Development Fileless Malware Transportation Small Businesses Hypervisor Displays Content Education Wearable Technology Comparison Shopping Undo Optimization Health IT PowerPoint Motherboard Tablet Assessment Permissions Alert Directions Mobile Computing Employer/Employee Relationships Outsourcing Managed IT Navigation Search File Sharing Dark Data PCI DSS Specifications How To Gig Economy Best Practice Workplace Internet Exlporer Buisness Fraud Notifications Internet Service Provider Microchip Teamwork Hiring/Firing Regulations Compliance Application Legal Username IT solutions Evernote Paperless Travel Black Friday Memes Business Growth Techology Co-managed IT Google Maps SQL Server Technology Care Database IBM Net Neutrality Financial Data History Business Communications IT Technicians Cortana Unified Threat Management Cyber Monday Smartwatch IT Proxy Server Alt Codes Unified Threat Management Scams Cookies Azure Hybrid Work Tactics Downtime Hotspot Procurement

Blog Archive