Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Small Business Ransomware Mobile Device Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Information Automation Facebook Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Blockchain Windows 10 Business Technology Wi-Fi Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Apps Data Security Apple BYOD Mobile Device Management App Gmail WiFi Tip of the week Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Chrome Budget Avoiding Downtime Marketing HIPAA Access Control Applications Computing Information Technology Office 365 Conferencing How To BDR Hacker Storage Password Bring Your Own Device Website Virtual Private Network Router 2FA Health Operating System Risk Management Big Data Help Desk Retail Healthcare Analytics Office Tips Managed IT Services Augmented Reality Computers Patch Management Save Money Solutions Remote Monitoring Cooperation End of Support Vulnerability Vendor Management Physical Security Display Windows 11 Firewall Printer Going Green Paperless Office Infrastructure Cybercrime Excel The Internet of Things Document Management Remote Workers Social Monitoring Scam Data loss Free Resource Project Management Windows 7 Customer Service Telephone Microsoft 365 Robot Sports Entertainment Wireless Technology Mouse Employees Integration IT Management Administration Telephone System VPN Meetings Cost Management Word Computer Repair Holidays Data Storage Settings Printing Supply Chain Wireless Video Conferencing Content Filtering Safety User Tip Modem Managed Services Provider Professional Services YouTube Processor Mobile Security Virtual Machines Machine Learning Cryptocurrency Smart Technology iPhone Maintenance Virtual Desktop Data storage Antivirus LiFi Saving Time Vulnerabilities Customer Relationship Management Outlook Data Privacy Managed IT Service Money Images 101 Hacking Humor Downloads Presentation Multi-Factor Authentication Mobility Licensing Remote Working Multi-Factor Security Memory Vendors Deep Learning Travel Social Network Google Play Be Proactive Google Maps IoT Dark Web Data Breach Techology Electronic Health Records Workforce Education Trends IP Address Videos Regulations Google Calendar Wasting Time Threats Unified Threat Management Customer Resource management Security Cameras Workplace Strategies Data Analysis Star Wars Microsoft Excel Trend Micro Unified Threat Management Mobile Computing Recovery Software as a Service Meta Search Gamification Staff Network Congestion Social Networking Hard Drives Legislation Managing Costs Amazon Best Practice SSID Buisness Fileless Malware Domains eCommerce User Error Wearable Technology Surveillance Legal Virtual Assistant Outsource IT IT solutions Content Health IT Motherboard Refrigeration Comparison Virtual Machine Environment Business Growth Media Point of Sale Medical IT Directions Assessment Public Speaking Reviews Permissions Development Transportation Small Businesses Network Management Tech Support Cortana Lithium-ion battery Monitors Specifications Entrepreneur Hypervisor Displays Alt Codes PowerPoint Downtime Microchip Internet Exlporer Shopping Fraud Optimization Employer/Employee Relationships Outsourcing Hosted Solution Websites Username Undo PCI DSS Black Friday Typing Navigation SharePoint Workplace Electronic Medical Records Database Gig Economy IT Technicians Internet Service Provider Google Drive Teamwork Hiring/Firing Knowledge Proxy Server Writing Cookies Regulations Compliance Cyber Monday Lenovo Evernote Paperless Co-managed IT Virtual Reality 5G Tactics Hotspot Memes Mirgation Application Net Neutrality Google Docs SQL Server Technology Care Server Management Unified Communications Private Cloud Experience Identity Theft Running Cable Nanotechnology Financial Data History Superfish Bitcoin Business Communications Google Wallet Scams Twitter Addiction IBM Smartwatch Language IT Chatbots Procurement Azure Hybrid Work Error Management Laptop Social Engineering Screen Reader Telework Distributed Denial of Service Cyber security Windows 8 Tech Human Resources Drones Cables Remote Computing Service Level Agreement CES Computing Infrastructure Communitications Identity Supply Chain Management Tablet Halloween Bookmark Smart Tech Competition FinTech Term Google Apps IT Maintenance Alert Download Alerts IT Assessment Dark Data Flexibility Value Business Intelligence Managed IT File Sharing Scary Stories Browsers How To Connectivity Organization Break Fix Hacks Shortcuts Smart Devices Ransmoware Notifications Fun Upload Digital Security Cameras User

Blog Archive