Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Email Workplace Tips Privacy Computer Google Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft AI Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Artificial Intelligence Automation Gadgets Cloud Computing Training Covid-19 Compliance IT Support Server Managed Service Provider Remote Work Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Managed Services Vendor Apps Two-factor Authentication Mobile Office WiFi Voice over Internet Protocol Employer-Employee Relationship BYOD Chrome Budget Tip of the week Mobile Device Management Apple Gmail App Networking How To BDR Computing Information Technology HIPAA Applications Physical Security Office 365 Hacker Access Control Avoiding Downtime Marketing Password Conferencing Managed IT Services 2FA Operating System Big Data Risk Management Healthcare Router Virtual Private Network Computers Analytics Office Tips Augmented Reality Help Desk Health Website Storage Bring Your Own Device Retail The Internet of Things Cybercrime Excel Patch Management Social Remote Workers Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Free Resource Project Management Display Printer Windows 7 Monitoring Paperless Office Microsoft 365 Infrastructure Solutions Document Management Managed IT Service Telephone Firewall Scam Data loss Cooperation Windows 11 Going Green Video Conferencing Settings Printing Managed Services Provider Wireless Supply Chain Virtual Machines Telephone System Professional Services Content Filtering Cost Management YouTube Robot Cryptocurrency iPhone Customer Relationship Management IT Management VPN Virtual Desktop Meetings Data storage User Tip LiFi Vulnerabilities Modem Mobile Security Processor Hacking Presentation Data Privacy Images 101 Outlook Computer Repair Money Multi-Factor Authentication Mobility Wireless Technology Smart Technology Humor Saving Time Sports Machine Learning Mouse Employees Word Integration Administration Downloads Maintenance Antivirus Licensing Holidays Entertainment Safety Data Storage Alert Displays Microsoft Excel Data Analysis Alt Codes Employer/Employee Relationships Star Wars Managed IT Gamification Downtime Navigation File Sharing Staff Dark Data PCI DSS Gig Economy Hosted Solution Social Networking How To Outsourcing Legislation Notifications Internet Service Provider Fileless Malware Typing Teamwork Content Evernote Travel Wearable Technology Application Workplace Regulations Compliance Google Drive Memes Techology Health IT Google Maps Motherboard Knowledge Hiring/Firing Comparison IBM Permissions Paperless Net Neutrality Directions SQL Server Assessment History Unified Threat Management 5G Co-managed IT Financial Data Smartwatch Google Docs IT Unified Threat Management Unified Communications Experience Technology Care Specifications Internet Exlporer Running Cable Fraud Business Communications Procurement Microchip Bitcoin Azure Google Wallet Cyber security Username Tech Network Congestion Scams Telework Black Friday CES Communitications User Error Competition Hybrid Work Database Laptop Human Resources Supply Chain Management Windows 8 Drones Term Point of Sale IT Technicians Cables FinTech Cyber Monday IT Assessment Proxy Server Cookies Tactics Halloween Tech Support Hotspot User Google Apps Flexibility Value Network Management Mirgation Monitors IT Maintenance Organization Business Intelligence Digital Security Cameras Smart Devices Nanotechnology Addiction Scary Stories Websites IP Address Language Shortcuts Remote Working Hacks Memory Data Breach Management Google Play Chatbots Fun Ransmoware Electronic Medical Records Vendors Distributed Denial of Service Videos Electronic Health Records SharePoint Deep Learning Screen Reader Service Level Agreement Computing Infrastructure Recovery Be Proactive Wasting Time Trend Micro Lenovo Education Security Cameras Identity Writing Hard Drives Workforce Virtual Reality Domains Threats Software as a Service Bookmark Smart Tech Server Management Download Private Cloud Alerts Workplace Strategies Mobile Computing Managing Costs eCommerce Superfish SSID Identity Theft Search Refrigeration Meta Twitter Public Speaking Amazon Break Fix Surveillance Browsers Best Practice Virtual Assistant Connectivity Virtual Machine Upload Buisness Error Lithium-ion battery Reviews Entrepreneur Legal Social Network IT solutions Medical IT Social Engineering Outsource IT Multi-Factor Security Remote Computing Environment Dark Web Media Development Business Growth Transportation IoT Hypervisor Trends Shopping Optimization Customer Resource management PowerPoint Tablet Regulations Cortana Undo Small Businesses Google Calendar

Blog Archive