Error
  • Error loading component: com_advancedmodules, 1

Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Navigation Bar

Technology Basics: Navigation Bar

Navigating some websites can be a pain, but thankfully, there is a handy-dandy tool that just about all of them utilize to make it easier for users. We’re talking, of course, about the navigation bar. We’ll discuss what the navigation bar is, what it does, and why it’s so helpful for a website or application’s end user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Covid-19 Cloud Computing Training Compliance Gadgets Outsourced IT Remote Work Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Windows 10 Wi-Fi Virtualization Business Technology Blockchain Vendor Mobile Office Data Security Two-factor Authentication Apps Budget Apple Networking App Mobile Device Management Gmail BYOD Managed Services Voice over Internet Protocol WiFi Employer-Employee Relationship Tip of the week Chrome Hacker HIPAA Applications Avoiding Downtime How To Marketing BDR Computing Conferencing Physical Security Information Technology Access Control Office 365 Retail Storage Computers Password Router Bring Your Own Device Managed IT Services Website 2FA Help Desk Operating System Healthcare Virtual Private Network Risk Management Big Data Health Analytics Office Tips Augmented Reality Customer Service Solutions Scam Data loss Windows 11 Going Green Patch Management Monitoring Save Money Remote Monitoring Firewall End of Support Excel Vulnerability Vendor Management Cybercrime Remote Workers Managed IT Service The Internet of Things Display Telephone Printer Social Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Hacking Maintenance Presentation Antivirus Sports Employees Mouse Wireless Technology Integration User Tip Administration Modem Processor Mobile Security Holidays Word Robot Data Storage Smart Technology Supply Chain Video Conferencing Settings Managed Services Provider Wireless Printing Saving Time Virtual Machines Content Filtering Professional Services IT Management VPN Safety YouTube Meetings Cryptocurrency Downloads Computer Repair iPhone Licensing Virtual Desktop Entertainment LiFi Vulnerabilities Data storage Data Privacy Images 101 Outlook Customer Relationship Management Machine Learning Multi-Factor Authentication Mobility Money Telephone System Cost Management Humor Hacks Server Management Content Remote Working Scary Stories Private Cloud Wearable Technology Memory Vendors Motherboard Data Breach Fun Comparison Google Play Be Proactive Superfish Health IT Identity Theft Directions Videos Deep Learning Assessment Electronic Health Records Twitter Permissions Workforce Error User Wasting Time Threats Education Trend Micro Social Engineering Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Remote Computing Fraud Meta Managing Costs Amazon Mobile Computing IP Address Username Tablet eCommerce Search Black Friday SSID Best Practice Database Surveillance Alert Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Dark Data Media Managed IT Buisness File Sharing Recovery Proxy Server Reviews IT solutions Hard Drives Cookies How To Cyber Monday Medical IT Legal Business Growth Domains Tactics Development Notifications Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Travel Shopping Google Maps Refrigeration Nanotechnology Optimization Cortana PowerPoint Techology Alt Codes Public Speaking Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Lithium-ion battery Management PCI DSS Downtime Unified Threat Management Gig Economy Hosted Solution Screen Reader Entrepreneur Distributed Denial of Service Workplace Unified Threat Management Typing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Network Congestion Evernote Paperless Regulations Compliance Bookmark Undo Smart Tech Memes Knowledge Co-managed IT Google Drive User Error Download Net Neutrality Alerts SQL Server Technology Care History 5G Business Communications Financial Data Point of Sale Browsers Smartwatch Unified Communications Connectivity IT Experience Break Fix Scams Google Docs Bitcoin Network Management Upload Procurement Running Cable Tech Support Azure Hybrid Work Application Cyber security Monitors Multi-Factor Security Tech Human Resources Google Wallet Social Network Telework CES IoT Communitications Dark Web Cables Windows 8 IBM Trends Supply Chain Management Laptop Websites Regulations Google Calendar Term Google Apps Drones Customer Resource management FinTech Data Analysis Star Wars IT Assessment Electronic Medical Records Microsoft Excel IT Maintenance SharePoint Gamification Flexibility Halloween Staff Value Business Intelligence Social Networking Writing Legislation Shortcuts Lenovo Organization Fileless Malware Digital Security Cameras Competition Smart Devices Virtual Reality Ransmoware

Blog Archive