Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Navigation Bar

Technology Basics: Navigation Bar

Navigating some websites can be a pain, but thankfully, there is a handy-dandy tool that just about all of them utilize to make it easier for users. We’re talking, of course, about the navigation bar. We’ll discuss what the navigation bar is, what it does, and why it’s so helpful for a website or application’s end user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Workplace Tips IT Services Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Artificial Intelligence Holiday Automation Information Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Bandwidth Wi-Fi Blockchain Windows 10 Business Technology Two-factor Authentication Vendor Apps Data Security Mobile Office Tip of the week WiFi Chrome Managed Services Voice over Internet Protocol Budget Employer-Employee Relationship Networking Apple App BYOD Mobile Device Management Gmail Applications Office 365 How To BDR Conferencing Hacker Avoiding Downtime Marketing Computing Information Technology Access Control HIPAA Router Analytics Office Tips Retail Big Data Augmented Reality Help Desk Storage Healthcare Managed IT Services Password Bring Your Own Device Computers Website Physical Security Operating System 2FA Virtual Private Network Risk Management Health The Internet of Things Document Management Social Monitoring Scam Data loss Remote Workers Customer Service Patch Management Free Resource Save Money Telephone Project Management Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Going Green Microsoft 365 Windows 11 Cooperation Solutions Display Cybercrime Printer Excel Firewall Paperless Office Infrastructure Holidays Virtual Desktop Safety Data storage LiFi Machine Learning Data Storage Modem User Tip Outlook Processor Video Conferencing Mobile Security Managed Services Provider Virtual Machines Maintenance Professional Services Data Privacy Money Humor Antivirus Smart Technology Customer Relationship Management Sports iPhone Mouse Saving Time Administration Vulnerabilities Managed IT Service Hacking Robot Presentation Downloads Images 101 Licensing Wireless Technology Mobility Multi-Factor Authentication Entertainment IT Management VPN Settings Meetings Wireless Printing Content Filtering Word Supply Chain YouTube Computer Repair Employees Telephone System Cost Management Integration Cryptocurrency Medical IT Specifications Electronic Medical Records Reviews Technology Care Google Wallet SharePoint Microchip Development Business Communications Internet Exlporer Transportation Fraud Undo Writing Scams Windows 8 Username Lenovo Hypervisor Laptop Optimization PowerPoint Black Friday Virtual Reality Shopping Hybrid Work Drones Human Resources Database Server Management Employer/Employee Relationships Private Cloud Navigation PCI DSS Cables Superfish Halloween IT Technicians Identity Theft Cookies Cyber Monday Application Twitter Gig Economy Proxy Server Internet Service Provider Google Apps Tactics Teamwork Hotspot Error Evernote Social Engineering Regulations Compliance IT Maintenance Hacks Scary Stories Mirgation IBM Memes Nanotechnology Fun Remote Computing Business Intelligence Net Neutrality Shortcuts Deep Learning Addiction SQL Server Language Tablet Financial Data Ransmoware Management History Chatbots IT Education Screen Reader Distributed Denial of Service Alert Smartwatch Vendors Dark Data Procurement Be Proactive Service Level Agreement Managed IT Azure Computing Infrastructure Competition File Sharing Tech How To Telework Workforce Mobile Computing Cyber security Identity Communitications Smart Tech Search Notifications CES Threats Bookmark Supply Chain Management Workplace Strategies Best Practice Download Alerts Travel Google Maps Term User FinTech Meta Techology Buisness Browsers IT Assessment IT solutions Connectivity Break Fix Amazon Legal Flexibility Business Growth Upload Value Unified Threat Management IP Address Multi-Factor Security Organization Outsource IT Social Network Unified Threat Management Smart Devices Media IoT Cortana Dark Web Digital Security Cameras Environment Network Congestion Remote Working Alt Codes Trends Memory Downtime Regulations Google Play Google Calendar Recovery Small Businesses Customer Resource management User Error Data Breach Displays Data Analysis Electronic Health Records Hosted Solution Star Wars Microsoft Excel Hard Drives Videos Typing Gamification Wasting Time Staff Domains Point of Sale Social Networking Security Cameras Legislation Outsourcing Trend Micro Google Drive Fileless Malware Software as a Service Network Management Knowledge Refrigeration Tech Support Monitors Workplace Content Managing Costs Wearable Technology Public Speaking Motherboard Lithium-ion battery SSID 5G Comparison Hiring/Firing Health IT eCommerce Google Docs Directions Surveillance Paperless Unified Communications Assessment Virtual Assistant Experience Permissions Websites Entrepreneur Co-managed IT Bitcoin Virtual Machine Running Cable

Blog Archive