Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery VoIP Upgrade Disaster Recovery Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Networking Budget WiFi Apple HIPAA Applications Computing Hacker Access Control Information Technology Avoiding Downtime Marketing Conferencing Office 365 How To BDR 2FA Router Virtual Private Network Operating System Computers Health Risk Management Help Desk Website Retail Analytics Office Tips Healthcare Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data Remote Monitoring Social Windows 11 Vulnerability End of Support Vendor Management Solutions Going Green Physical Security Excel Display Printer Customer Service Cybercrime Paperless Office Infrastructure Monitoring Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 IT Management Supply Chain VPN Employees Meetings Integration Customer Relationship Management Settings Wireless User Tip Printing Modem Computer Repair Mobile Security Content Filtering Processor Hacking YouTube Presentation Holidays Data Storage Cryptocurrency Smart Technology Wireless Technology Video Conferencing Machine Learning Managed Services Provider Virtual Desktop Professional Services Data Privacy Saving Time Virtual Machines Data storage LiFi Word Managed IT Service Outlook Maintenance Antivirus Downloads iPhone Money Humor Licensing Vulnerabilities Entertainment Safety Sports Images 101 Mouse Telephone System Multi-Factor Authentication Robot Mobility Administration Cost Management Content Remote Working Application Best Practice Wearable Technology Memory Health IT Unified Threat Management Motherboard Data Breach Buisness Comparison Google Play Small Businesses IT solutions Permissions Displays Unified Threat Management Directions Videos IBM Legal Assessment Electronic Health Records Business Growth Wasting Time Trend Micro Network Congestion Specifications Security Cameras Outsourcing Fraud Cortana User Error Microchip Internet Exlporer Software as a Service Username Alt Codes Managing Costs Workplace Competition Point of Sale eCommerce Downtime Black Friday SSID Hiring/Firing Database Surveillance Hosted Solution Virtual Assistant Paperless Network Management Typing Tech Support IT Technicians Virtual Machine Co-managed IT Monitors Cyber Monday Medical IT Technology Care Proxy Server Reviews Cookies Google Drive Tactics Development User Hotspot Transportation Knowledge Business Communications Websites Mirgation Hypervisor Scams PowerPoint Hybrid Work 5G Shopping Nanotechnology Optimization IP Address Google Docs Addiction Unified Communications Electronic Medical Records Language Employer/Employee Relationships Experience Human Resources SharePoint Management PCI DSS Bitcoin Chatbots Running Cable Navigation Cables Writing Distributed Denial of Service Lenovo Gig Economy Google Wallet Screen Reader Service Level Agreement Internet Service Provider Recovery Virtual Reality Computing Infrastructure Teamwork Google Apps Server Management Regulations Compliance Hard Drives Windows 8 Private Cloud Identity Laptop Evernote IT Maintenance Business Intelligence Superfish Bookmark Domains Drones Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Shortcuts Financial Data Refrigeration Error History Halloween Ransmoware Social Engineering Break Fix Vendors Browsers Smartwatch Public Speaking Connectivity IT Lithium-ion battery Upload Procurement Remote Computing Azure Be Proactive Social Network Telework Hacks Cyber security Entrepreneur Scary Stories Multi-Factor Security Tech Workforce Dark Web Threats Fun CES Tablet IoT Communitications Trends Supply Chain Management Deep Learning Alert Workplace Strategies Managed IT Customer Resource management FinTech Undo File Sharing Regulations Dark Data Google Calendar Term Meta Education How To Microsoft Excel Amazon Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Organization Mobile Computing Travel Social Networking Legislation Outsource IT Environment Search Media Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices

Blog Archive