Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade AI VoIP Business Management Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Automation Facebook Information Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Virtualization Blockchain Wi-Fi Mobile Office Apps Vendor Two-factor Authentication Data Security Chrome BYOD Budget Mobile Device Management Gmail Apple App Tip of the week Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Office 365 Avoiding Downtime Marketing Conferencing Access Control WiFi Computing Information Technology HIPAA How To BDR Applications Hacker Analytics Office Tips Augmented Reality Website Help Desk Storage Virtual Private Network Password Bring Your Own Device Health 2FA Big Data Retail Healthcare Operating System Managed IT Services Risk Management Router Computers Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Monitoring Physical Security Display Firewall Printer Paperless Office Telephone Infrastructure Windows 11 The Internet of Things Going Green Document Management Cooperation Remote Workers Social Excel Cybercrime Scam Data loss Free Resource Project Management Customer Service Windows 7 Microsoft 365 Processor Mobile Security Robot Data Privacy Wireless Technology Outlook Money Employees IT Management Humor Smart Technology Integration VPN Meetings Word Saving Time Sports Computer Repair Mouse Holidays Managed IT Service Data Storage Downloads Administration Safety Video Conferencing Managed Services Provider Licensing Virtual Machines Professional Services Entertainment Machine Learning Supply Chain Settings Printing Wireless Maintenance Content Filtering Telephone System iPhone Antivirus Cost Management YouTube Customer Relationship Management Vulnerabilities Cryptocurrency Images 101 Hacking Virtual Desktop Multi-Factor Authentication Mobility Presentation Modem Data storage LiFi User Tip Laptop Memory Database Travel Windows 8 Remote Working Drones Google Apps Data Breach Techology Google Play Google Maps IT Technicians IP Address Cookies Cyber Monday Videos IT Maintenance Electronic Health Records Proxy Server Halloween Wasting Time Tactics Unified Threat Management Hotspot Business Intelligence Shortcuts Trend Micro Unified Threat Management Security Cameras Mirgation Nanotechnology Recovery Ransmoware Software as a Service Vendors Scary Stories Managing Costs Addiction Hard Drives Language Network Congestion Hacks Be Proactive eCommerce Fun User Error Management SSID Domains Chatbots Virtual Assistant Screen Reader Distributed Denial of Service Deep Learning Workforce Surveillance Threats Virtual Machine Service Level Agreement Refrigeration Point of Sale Computing Infrastructure Identity Reviews Education Workplace Strategies Medical IT Public Speaking Bookmark Transportation Lithium-ion battery Network Management Smart Tech Tech Support Meta Development Amazon Hypervisor Download Alerts Entrepreneur Monitors Mobile Computing Shopping Optimization Search PowerPoint Browsers Employer/Employee Relationships Connectivity Websites Break Fix Best Practice Outsource IT Environment PCI DSS Buisness Media Upload Navigation Undo Electronic Medical Records Legal Multi-Factor Security Gig Economy IT solutions SharePoint Social Network Teamwork IoT Dark Web Business Growth Small Businesses Internet Service Provider Displays Regulations Compliance Lenovo Trends Evernote Writing Regulations Virtual Reality Google Calendar Memes Cortana Customer Resource management Data Analysis SQL Server Server Management Star Wars Application Private Cloud Microsoft Excel Alt Codes Outsourcing Net Neutrality Financial Data Downtime History Superfish Gamification Identity Theft Staff IBM Social Networking Twitter Legislation Smartwatch Hosted Solution Workplace IT Fileless Malware Azure Error Typing Hiring/Firing Procurement Social Engineering Telework Paperless Cyber security Content Tech Wearable Technology Motherboard Remote Computing Google Drive Comparison CES Co-managed IT Communitications Knowledge Health IT Directions Assessment Permissions Technology Care Supply Chain Management FinTech Business Communications 5G Term Competition Tablet Alert Google Docs Specifications Unified Communications Scams IT Assessment Experience Running Cable Microchip Value Managed IT Internet Exlporer File Sharing Fraud Dark Data Bitcoin Hybrid Work Flexibility How To Google Wallet Organization Human Resources Username User Notifications Black Friday Digital Security Cameras Cables Smart Devices

Blog Archive