Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Holiday Artificial Intelligence Information Automation Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Windows 10 Wi-Fi Virtualization Blockchain Bandwidth Business Technology Data Security Two-factor Authentication Apps Vendor Mobile Office Managed Services App Voice over Internet Protocol Gmail WiFi Networking Employer-Employee Relationship BYOD Chrome Budget Apple Tip of the week Mobile Device Management Computing How To Conferencing BDR Information Technology Office 365 Hacker Avoiding Downtime Access Control HIPAA Marketing Applications Retail Healthcare Help Desk Operating System Managed IT Services Big Data Risk Management Office Tips Analytics Computers Augmented Reality Virtual Private Network 2FA Storage Password Health Router Website Bring Your Own Device Firewall Remote Workers Going Green Monitoring Scam Data loss The Internet of Things Cybercrime Free Resource Project Management Windows 7 Social Telephone Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Cooperation Solutions Customer Service Physical Security Display Printer Windows 11 Paperless Office Infrastructure Excel Document Management Maintenance Smart Technology Antivirus Settings Safety iPhone Printing Wireless Content Filtering Data Privacy Saving Time Vulnerabilities YouTube Managed IT Service Cryptocurrency Images 101 Downloads Robot Multi-Factor Authentication Mobility Licensing Virtual Desktop Entertainment Customer Relationship Management Data storage LiFi IT Management Meetings Employees Outlook VPN Hacking Integration Money Telephone System Presentation Cost Management Humor Computer Repair Wireless Technology Holidays Sports Supply Chain Mouse Data Storage Video Conferencing Modem Managed Services Provider Word Administration User Tip Machine Learning Processor Virtual Machines Mobile Security Professional Services Cookies Cyber Monday Evernote Legal Server Management IT solutions Technology Care Proxy Server Private Cloud Regulations Compliance Public Speaking Identity Theft Lithium-ion battery Business Communications Tactics Memes Hotspot Superfish Business Growth Scams Twitter Net Neutrality Mirgation SQL Server Entrepreneur Nanotechnology History Hybrid Work Error Financial Data Cortana Alt Codes Smartwatch Human Resources Addiction Social Engineering IT Language Downtime Cables Management Remote Computing Procurement Undo Chatbots Azure Screen Reader Cyber security Distributed Denial of Service Tech Hosted Solution Telework Typing Tablet CES Google Apps Service Level Agreement Communitications Computing Infrastructure IT Maintenance Alert Supply Chain Management Identity FinTech Knowledge Smart Tech Dark Data Term Google Drive Managed IT Business Intelligence Bookmark File Sharing Shortcuts Download How To IT Assessment Application Alerts Value Ransmoware Notifications Flexibility 5G Travel Organization Experience IBM Connectivity Break Fix Google Docs Unified Communications Vendors Browsers Techology Bitcoin Google Maps Digital Security Cameras Running Cable Be Proactive Upload Smart Devices Memory Multi-Factor Security Google Wallet Workforce Social Network Remote Working Unified Threat Management IoT Data Breach Dark Web Google Play Threats Unified Threat Management Windows 8 Videos Laptop Workplace Strategies Trends Electronic Health Records Regulations Wasting Time Google Calendar Drones Meta Customer Resource management Competition Data Analysis Star Wars Network Congestion Trend Micro Microsoft Excel Security Cameras Amazon User Error Halloween Gamification Software as a Service Staff Social Networking Managing Costs Legislation Outsource IT Fileless Malware Point of Sale Media eCommerce User SSID Environment Hacks Scary Stories Content Surveillance Wearable Technology Virtual Assistant Motherboard Virtual Machine Comparison Network Management Small Businesses Health IT Tech Support Fun Directions Reviews IP Address Assessment Monitors Permissions Medical IT Deep Learning Displays Development Transportation Hypervisor Specifications Education Outsourcing Websites Microchip Shopping Internet Exlporer Optimization Recovery Fraud PowerPoint SharePoint Mobile Computing Workplace Username Electronic Medical Records Hard Drives Employer/Employee Relationships Black Friday Navigation Hiring/Firing PCI DSS Search Domains Gig Economy Paperless Database Writing Lenovo Best Practice Buisness Co-managed IT Virtual Reality Internet Service Provider Refrigeration IT Technicians Teamwork

Blog Archive