Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI Business Management VoIP Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Automation Facebook Information Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Bandwidth Blockchain Business Technology Virtualization Data Security Two-factor Authentication Mobile Office Vendor Apps BYOD Mobile Device Management Chrome Gmail Budget Tip of the week Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking BDR Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 Access Control HIPAA WiFi Applications How To Computers Risk Management 2FA Website Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Password Bring Your Own Device Router Big Data Retail Healthcare Managed IT Services Help Desk Operating System Windows 7 Windows 11 Patch Management Save Money Microsoft 365 Remote Monitoring Telephone Vulnerability End of Support Vendor Management Solutions Excel Physical Security Cooperation Display Firewall Printer Paperless Office Infrastructure The Internet of Things Document Management Social Remote Workers Scam Going Green Data loss Monitoring Customer Service Free Resource Cybercrime Project Management YouTube Saving Time Images 101 Presentation Mobility Cryptocurrency Robot Multi-Factor Authentication Managed IT Service Wireless Technology Supply Chain Downloads Virtual Desktop Licensing IT Management Data storage LiFi VPN Meetings Employees Word Entertainment Integration Outlook Computer Repair Money Humor Telephone System Holidays Cost Management Safety Data Storage Sports Mouse Video Conferencing Data Privacy Machine Learning Managed Services Provider Virtual Machines Professional Services Administration User Tip Modem Mobile Security Maintenance Processor Antivirus iPhone Customer Relationship Management Settings Wireless Vulnerabilities Smart Technology Printing Content Filtering Hacking How To IT Assessment Outsource IT Screen Reader Distributed Denial of Service Media Computing Infrastructure Google Drive Notifications Flexibility User Knowledge Value Environment Service Level Agreement Identity Travel Organization Smart Devices 5G Bookmark Small Businesses Smart Tech Techology Google Maps Digital Security Cameras Alerts Google Docs IP Address Unified Communications Remote Working Experience Memory Displays Download Google Play Unified Threat Management Bitcoin Running Cable Data Breach Electronic Health Records Browsers Outsourcing Connectivity Unified Threat Management Break Fix Google Wallet Videos Recovery Wasting Time Upload Social Network Security Cameras Workplace Multi-Factor Security Windows 8 Hard Drives Network Congestion Laptop Trend Micro Software as a Service Hiring/Firing IoT User Error Dark Web Drones Domains Paperless Managing Costs Trends Customer Resource management SSID Co-managed IT Regulations Google Calendar Point of Sale Refrigeration Halloween eCommerce Public Speaking Surveillance Data Analysis Virtual Assistant Technology Care Star Wars Microsoft Excel Business Communications Staff Network Management Lithium-ion battery Tech Support Virtual Machine Gamification Entrepreneur Medical IT Scams Social Networking Legislation Hacks Reviews Monitors Scary Stories Development Fun Fileless Malware Transportation Hybrid Work Human Resources Wearable Technology Websites Deep Learning Hypervisor Content Optimization Health IT PowerPoint Cables Motherboard Comparison Shopping Undo Electronic Medical Records Education Directions Employer/Employee Relationships Assessment SharePoint Permissions Navigation Google Apps PCI DSS IT Maintenance Lenovo Specifications Mobile Computing Gig Economy Writing Virtual Reality Internet Service Provider Search Microchip Teamwork Business Intelligence Internet Exlporer Fraud Username Evernote Shortcuts Server Management Private Cloud Best Practice Regulations Compliance Application Buisness Memes Ransmoware Superfish Black Friday Identity Theft Legal IBM Twitter IT solutions Net Neutrality SQL Server Vendors Database Be Proactive IT Technicians Error Business Growth Financial Data History Social Engineering IT Proxy Server Workforce Cookies Cyber Monday Smartwatch Hotspot Remote Computing Procurement Cortana Azure Threats Tactics Tech Workplace Strategies Mirgation Alt Codes Telework Cyber security Downtime Communitications Meta Nanotechnology Tablet CES Competition Language Alert Hosted Solution Supply Chain Management Amazon Addiction Management Term Chatbots Managed IT File Sharing Typing FinTech Dark Data

Blog Archive