Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Internet Tech Term Business Computing Computer Network Security Business Data Hosted Solutions Innovation Software Efficiency IT Services User Tips Android Data Backup Mobile Devices Microsoft Hardware Smartphone Communication Browser Google Productivity Windows 10 Business Management Small Business Workplace Tips Artificial Intelligence Ransomware Productivity Data Recovery Social Media Managed Service Provider Backup Gmail Data Management Facebook IT Support Internet of Things Smartphones App Encryption Server Microsoft Office Two-factor Authentication Collaboration Saving Money Managed IT Services Phishing Managed Service Mobile Device Passwords communications Upgrade Cloud Computing Business Technology Office 365 Windows Office Tips Cybersecurity Windows 10 Automation Bandwidth Miscellaneous Disaster Recovery Information Spam Applications Going Green Outsourced IT Computing BDR Website Printer Mobile Device Management Access Control Firewall IT Support Infrastructure The Internet of Things Tip of the week Paperless Office WiFi Business Continuity Government Blockchain Big Data Scam Social BYOD Apps Employer-Employee Relationship VoIP Users Holiday Modem Mobile Security Customer Service Hacking Network Presentation Computers Settings Hacker Printing Vulnerability Office Content Filtering Robot Wireless Technology Cybercrime Wi-Fi End of Support Saving Time Risk Management Quick Tips LiFi Data storage Analytics Augmented Reality Safety Money Chrome Storage Cost Management Sports Mouse Bring Your Own Device Antivirus Administration Document Management HIPAA Apple Maintenance Vendor Router Data Security Competition Business Growth Comparison Data loss User Tip Tech Support Database Patch Management Processor Techology Cortana Dark Data IT Technicians Alt Codes Specifications Proxy Server How To Cookies Navigation Wireless Websites Tactics Hotspot User Downtime Hosted Solution Unified Threat Management Tablet Monitoring Mirgation Operating System Nanotechnology Typing Black Friday Remote Monitoring Help Desk Save Money Evernote Machine Learning Addiction Language IP Address Avoiding Downtime YouTube VPN User Error Knowledge Management Chatbots Google Drive Screen Reader Cryptocurrency Cyber Monday IT Management Vendor Management Virtual Private Network Healthcare Marketing 5G Error Service Level Agreement Computing Infrastructure Mobile Office Information Technology Recovery Hard Drives Unified Communications Experience Google Maps Conferencing Network Congestion Identity Google Docs Electronic Medical Records Smart Tech Domains Bitcoin Smart Technology Word Running Cable Bookmark Tech Download Alerts Google Wallet Virtual Desktop Refrigeration Telephone Display Virtual Reality Connectivity Public Speaking Windows 8 Distributed Denial of Service Laptop Network Management Browsers Term Travel Upload Licensing Lithium-ion battery Drones SharePoint Entrepreneur Social Network Monitors Compliance Outlook Remote Computing IoT Dark Web Managed IT Service Halloween Entertainment Lenovo Mobility Unified Threat Management Trends Cooperation Undo Downloads Customer Resource management Regulations Humor Alert Star Wars Microsoft Excel Hacks Break Fix Scary Stories Data Analysis Superfish Google Play Fun Gamification Staff Budget Virtualization Deep Learning Multi-Factor Security Telephone System Writing Social Networking Password Server Management Fileless Malware Application Education Security Cameras Content Wearable Technology Google Calendar Managed IT Services Health IT Retail Motherboard Gadgets Assessment Permissions IBM Mobile Computing Directions Networking SSID Search Best Practice Legislation Social Engineering Internet Exlporer Fraud Customer Relationship Management Current Events Buisness Microchip IT solutions Identity Theft Username Legal

Sign Up For Our Newsletter!