Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Workplace Strategy Hosted Solutions Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Artificial Intelligence Holiday Automation Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Government Business Continuity Windows 10 Wi-Fi Blockchain Virtualization Bandwidth Business Technology Data Security Two-factor Authentication Vendor Apps Mobile Office Gmail Networking WiFi Employer-Employee Relationship BYOD Chrome Budget Managed Services Voice over Internet Protocol Apple Tip of the week Mobile Device Management App Computing How To Information Technology BDR HIPAA Applications Office 365 Hacker Avoiding Downtime Access Control Conferencing Marketing Retail Operating System Managed IT Services Big Data Risk Management Router Analytics Office Tips 2FA Augmented Reality Computers Virtual Private Network Help Desk Storage Password Health Bring Your Own Device Healthcare Website Windows 7 Firewall Going Green Cooperation Microsoft 365 Scam Data loss Cybercrime The Internet of Things Solutions Social Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Physical Security Excel Monitoring Display Printer Remote Workers Paperless Office Infrastructure Telephone Free Resource Document Management Project Management Images 101 Entertainment Mobility Maintenance Settings Multi-Factor Authentication Wireless Antivirus Printing Content Filtering Safety Telephone System YouTube Cost Management Cryptocurrency Employees Integration Robot Virtual Desktop LiFi Data storage Holidays Customer Relationship Management User Tip Modem Mobile Security Data Storage Processor Outlook Supply Chain IT Management Video Conferencing VPN Meetings Money Humor Managed Services Provider Hacking Presentation Professional Services Virtual Machines Smart Technology Computer Repair Wireless Technology Sports Saving Time Mouse iPhone Administration Managed IT Service Vulnerabilities Word Machine Learning Downloads Data Privacy Licensing IT Assessment Public Speaking IT Maintenance Server Management Social Network Private Cloud Multi-Factor Security Dark Web Flexibility Cortana Lithium-ion battery Value Business Intelligence Superfish Identity Theft IoT Shortcuts Trends Entrepreneur Twitter Alt Codes Organization Smart Devices Ransmoware Customer Resource management Error Regulations Digital Security Cameras Downtime Google Calendar Social Engineering Hosted Solution Microsoft Excel Remote Working Memory Vendors Data Analysis Star Wars Undo Google Play Be Proactive Gamification Remote Computing Typing Staff Data Breach Electronic Health Records Workforce Social Networking Videos Legislation Knowledge Wasting Time Threats Fileless Malware Tablet Google Drive Security Cameras Workplace Strategies Content Alert Wearable Technology Trend Micro Comparison Software as a Service 5G Meta Managed IT Health IT File Sharing Motherboard Dark Data Assessment How To Unified Communications Permissions Experience Managing Costs Amazon Directions Application Google Docs SSID Notifications Bitcoin Running Cable eCommerce Specifications Surveillance IBM Virtual Assistant Outsource IT Travel Google Wallet Internet Exlporer Fraud Virtual Machine Environment Techology Microchip Media Google Maps Medical IT Username Windows 8 Reviews Laptop Black Friday Development Transportation Small Businesses Unified Threat Management Drones Database Hypervisor Displays Unified Threat Management Competition PowerPoint IT Technicians Shopping Halloween Optimization Cyber Monday Employer/Employee Relationships Outsourcing Proxy Server Cookies Network Congestion Tactics Hotspot PCI DSS User Error Navigation Workplace Hacks Mirgation Gig Economy Scary Stories Internet Service Provider Fun Teamwork Hiring/Firing User Point of Sale Nanotechnology Addiction Deep Learning Language Regulations Compliance Evernote Paperless Co-managed IT Network Management Management Tech Support Chatbots Memes Education Distributed Denial of Service Net Neutrality IP Address SQL Server Technology Care Screen Reader Monitors Service Level Agreement Computing Infrastructure Financial Data History Business Communications Scams Websites Mobile Computing Identity Smartwatch IT Procurement Search Azure Hybrid Work Bookmark Recovery Smart Tech Download Electronic Medical Records Best Practice Alerts Telework Cyber security SharePoint Hard Drives Tech Human Resources Domains Cables CES Buisness Communitications Writing IT solutions Break Fix Supply Chain Management Lenovo Browsers Legal Connectivity Upload Virtual Reality Business Growth FinTech Refrigeration Term Google Apps

Blog Archive