Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Workplace Tips IT Services Privacy Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery AI Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Holiday Miscellaneous Automation Information Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Virtualization Business Technology Wi-Fi Blockchain Windows 10 Apps Mobile Office Two-factor Authentication Data Security Vendor WiFi Budget BYOD Apple Employer-Employee Relationship App Tip of the week Networking Mobile Device Management Gmail Managed Services Voice over Internet Protocol Chrome Applications Access Control Conferencing Hacker Avoiding Downtime Computing Information Technology Marketing How To BDR Office 365 HIPAA Storage Password Physical Security Big Data 2FA Virtual Private Network Bring Your Own Device Help Desk Health Computers Operating System Retail Website Risk Management Managed IT Services Office Tips Analytics Router Augmented Reality Healthcare Vendor Management The Internet of Things Windows 11 Free Resource Social Project Management Display Windows 7 Printer Monitoring Excel Paperless Office Microsoft 365 Infrastructure Solutions Going Green Customer Service Document Management Telephone Cybercrime Cooperation Scam Data loss Firewall Patch Management Save Money Remote Workers Remote Monitoring Vulnerability End of Support iPhone IT Management User Tip Modem VPN Processor Meetings Mobile Security Sports Vulnerabilities Mouse Supply Chain Computer Repair Images 101 Administration Smart Technology Multi-Factor Authentication Mobility Customer Relationship Management Saving Time Hacking Machine Learning Managed IT Service Settings Employees Presentation Integration Printing Downloads Wireless Content Filtering Licensing Wireless Technology Maintenance YouTube Data Privacy Antivirus Entertainment Holidays Cryptocurrency Data Storage Word Telephone System Virtual Desktop Video Conferencing Managed Services Provider Data storage Cost Management LiFi Virtual Machines Professional Services Outlook Robot Money Safety Humor Hacks Scary Stories Smartwatch Outsource IT Unified Threat Management IT Username Azure Black Friday Environment Fun Procurement Media Telework Cyber security Database Tech Deep Learning Network Congestion IT Technicians CES Small Businesses User Error Communitications Supply Chain Management Application Proxy Server Cookies Education Cyber Monday Displays FinTech Point of Sale Tactics Term Hotspot Mobile Computing Mirgation Outsourcing IBM IT Assessment Flexibility Network Management Value Tech Support Nanotechnology Search Organization Workplace Addiction Best Practice Monitors Language Management Chatbots Buisness Digital Security Cameras Hiring/Firing Smart Devices Remote Working Paperless Memory Legal Websites Screen Reader IT solutions Distributed Denial of Service Computing Infrastructure Co-managed IT Competition Data Breach Service Level Agreement Google Play Business Growth Electronic Medical Records Identity Videos Technology Care SharePoint Electronic Health Records Business Communications Bookmark Wasting Time Smart Tech Cortana Alerts Scams Lenovo Trend Micro Download Security Cameras Alt Codes Writing User Virtual Reality Downtime Hybrid Work Software as a Service Human Resources Server Management Browsers Managing Costs Private Cloud Connectivity Hosted Solution Break Fix Cables Superfish eCommerce Identity Theft Upload SSID Typing Social Network Virtual Assistant Twitter Multi-Factor Security IP Address Surveillance Google Apps Virtual Machine Google Drive Error IoT Dark Web Knowledge Social Engineering Reviews IT Maintenance Trends Medical IT Recovery Customer Resource management Transportation Remote Computing Regulations Google Calendar Business Intelligence 5G Development Shortcuts Hard Drives Data Analysis Hypervisor Google Docs Star Wars Unified Communications Microsoft Excel Experience Staff Running Cable Shopping Ransmoware Domains Optimization Tablet Gamification PowerPoint Bitcoin Employer/Employee Relationships Google Wallet Alert Social Networking Legislation Vendors PCI DSS Be Proactive Managed IT Refrigeration Fileless Malware File Sharing Navigation Dark Data Windows 8 How To Wearable Technology Laptop Gig Economy Workforce Public Speaking Content Health IT Teamwork Drones Notifications Motherboard Comparison Threats Lithium-ion battery Internet Service Provider Regulations Compliance Workplace Strategies Directions Travel Entrepreneur Assessment Evernote Permissions Halloween Meta Techology Memes Google Maps SQL Server Specifications Amazon Net Neutrality Financial Data Undo Microchip History Unified Threat Management Internet Exlporer Fraud

Blog Archive