Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing Hosted Solutions IT Services Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Backup Passwords Communication Data Backup Saving Money Smartphone Managed Service Android Business Management VoIP Smartphones Mobile Devices communications Upgrade Data Recovery Disaster Recovery Social Media Productivity Browser Microsoft Office Windows Managed IT Services Current Events AI Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Miscellaneous Information Remote Work Training Server Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology IT Support Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Managed Services Voice over Internet Protocol Chrome Gmail Budget How To BDR HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Tip of the week WiFi Big Data Managed IT Services Router Operating System Computers Virtual Private Network Risk Management Help Desk Website Health Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Windows 7 Social Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Physical Security Windows 11 Display 2FA Printer Monitoring Paperless Office Excel Infrastructure Remote Workers Firewall Document Management Telephone The Internet of Things Scam Cooperation Free Resource Data loss Project Management Images 101 Administration Mobility Telephone System Multi-Factor Authentication Cost Management Robot Customer Relationship Management Settings Employees Printing Integration Wireless Content Filtering Modem User Tip Hacking IT Management Processor Presentation VPN YouTube Meetings Mobile Security Holidays Cryptocurrency Wireless Technology Data Storage Computer Repair Smart Technology Supply Chain Video Conferencing Virtual Desktop Data storage LiFi Managed Services Provider Virtual Machines Professional Services Saving Time Word Outlook Machine Learning Managed IT Service Money Downloads Humor iPhone Licensing Safety Maintenance Antivirus Sports Vulnerabilities Entertainment Mouse Data Privacy Mobile Computing Star Wars IT Assessment Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Tablet Staff Value Business Intelligence Search Alert Legislation Shortcuts Organization Application Best Practice Social Networking Managed IT Smart Devices Buisness File Sharing Ransmoware Dark Data Fileless Malware Digital Security Cameras IBM Legal Content Remote Working IT solutions Wearable Technology Memory Vendors How To Notifications Comparison Google Play Be Proactive Health IT Business Growth Motherboard Data Breach Directions Videos Assessment Electronic Health Records Travel Permissions Workforce Techology Google Maps Wasting Time Threats Cortana Trend Micro Specifications Security Cameras Workplace Strategies Alt Codes Microchip Competition Internet Exlporer Software as a Service Downtime Unified Threat Management Fraud Meta Unified Threat Management Username Hosted Solution Managing Costs Amazon eCommerce Black Friday SSID Typing Database Surveillance Virtual Assistant Outsource IT Network Congestion Media Google Drive User Error User IT Technicians Virtual Machine Environment Knowledge Cookies Cyber Monday Medical IT Proxy Server Reviews Tactics Development Point of Sale Hotspot Transportation Small Businesses 5G IP Address Google Docs Unified Communications Mirgation Hypervisor Displays Experience Nanotechnology Optimization Running Cable Tech Support PowerPoint Shopping Bitcoin Network Management Google Wallet Addiction Language Employer/Employee Relationships Outsourcing Monitors Navigation Management PCI DSS Recovery Chatbots Screen Reader Laptop Websites Distributed Denial of Service Workplace Gig Economy Hard Drives Windows 8 Domains Drones Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless SharePoint Regulations Compliance Identity Electronic Medical Records Smart Tech Memes Halloween Co-managed IT Bookmark Refrigeration Public Speaking Lenovo Download Net Neutrality Alerts SQL Server Technology Care Writing Business Communications Lithium-ion battery Financial Data History Virtual Reality Connectivity IT Entrepreneur Scary Stories Private Cloud Break Fix Scams Browsers Smartwatch Hacks Server Management Superfish Upload Procurement Identity Theft Azure Hybrid Work Fun Multi-Factor Security Tech Human Resources Social Network Telework Deep Learning Cyber security Twitter IoT Communitications Error Dark Web Cables CES Undo Trends Supply Chain Management Education Social Engineering Remote Computing Google Calendar Term Google Apps Customer Resource management FinTech Regulations

Blog Archive