Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Phishing Efficiency Google Workplace Tips Computer Privacy Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Small Business Communication Smartphones Mobile Device Business Management Workplace Strategy Mobile Devices communications Android Smartphone VoIP Saving Money Managed IT Services Microsoft Office Browser Managed Service Data Recovery Social Media Passwords Backup Disaster Recovery Network Upgrade Internet of Things Tech Term Automation Covid-19 Remote Cloud Computing Remote Work Server Managed Service Provider Artificial Intelligence Facebook Miscellaneous Gadgets Encryption Spam Windows Holiday Information Windows 10 Employee/Employer Relationship Outsourced IT Business Continuity Data Management Government Windows 10 Business Technology Wi-Fi Productivity Blockchain Bandwidth Virtualization Current Events Apps Two-factor Authentication Compliance Data Security Budget Gmail Vendor Apple App Employer-Employee Relationship Networking Office Managed Services Voice over Internet Protocol Chrome Mobile Device Management Applications Access Control Conferencing Computing Information Technology Hacker How To BDR Avoiding Downtime Office 365 Mobile Office Storage Password Virtual Private Network Training Router Bring Your Own Device WiFi Health Big Data Help Desk Retail Operating System Computers Risk Management Managed IT Services Website Marketing Analytics Office Tips Augmented Reality BYOD Firewall Free Resource Project Management Display HIPAA Windows 7 Printer The Internet of Things Paperless Office Infrastructure Microsoft 365 AI Social Solutions Tip of the week Document Management Monitoring Going Green Windows 11 Cybercrime Scam Customer Service Data loss Telephone Excel Cooperation Patch Management Remote Workers Save Money Remote Monitoring End of Support Healthcare IT Support Vulnerability Vendor Management Data Privacy VPN Meetings Vulnerabilities Sports Safety Images 101 Computer Repair Mouse Multi-Factor Authentication Mobility Administration User Tip Modem Mobile Security Processor Machine Learning Employees Smart Technology Integration Settings Wireless Printing Customer Relationship Management Maintenance Content Filtering Saving Time Antivirus Holidays 2FA YouTube Supply Chain Managed IT Service Hacking Cryptocurrency Presentation Data Storage Downloads Video Conferencing Licensing Wireless Technology Managed Services Provider Virtual Desktop Virtual Machines Professional Services Data storage LiFi Entertainment Robot Outlook Word Telephone System iPhone Money Cost Management Humor IT Management Cyber security Network Congestion Content Tech Wearable Technology Hacks Public Speaking Telework Scary Stories Lithium-ion battery Comparison CES Communitications Fun Physical Security Health IT Motherboard Google Apps User Error Assessment IT Maintenance Permissions Deep Learning Supply Chain Management Entrepreneur Directions Term Business Intelligence FinTech Point of Sale Specifications Education IT Assessment Shortcuts Internet Exlporer Ransmoware Fraud Network Management Undo Flexibility Tech Support Microchip Value Monitors Username Vendors Mobile Computing Organization Black Friday Digital Security Cameras Smart Devices Search Be Proactive Database Workforce Best Practice Remote Working Websites Memory Data Breach Google Play Threats IT Technicians Buisness SharePoint Cyber Monday Videos IT solutions Application Electronic Health Records Electronic Medical Records Proxy Server Cookies Legal Workplace Strategies Tactics Meta Hotspot Business Growth Wasting Time Trend Micro Writing Security Cameras Amazon Mirgation Lenovo IBM Software as a Service Cortana Virtual Reality Nanotechnology Addiction Outsource IT Language Alt Codes Server Management Private Cloud Managing Costs Identity Theft eCommerce Management SSID Environment Chatbots Media Superfish Downtime Distributed Denial of Service Hosted Solution Surveillance Twitter Virtual Assistant Screen Reader Service Level Agreement Small Businesses Computing Infrastructure Typing Competition Error Virtual Machine Social Engineering Medical IT Displays Identity Reviews Google Drive Development Knowledge Remote Computing Bookmark Transportation Smart Tech Download Outsourcing Alerts Hypervisor Tablet User Optimization 5G PowerPoint Shopping Google Docs Workplace Break Fix Unified Communications Experience Alert Browsers Employer/Employee Relationships Connectivity Dark Data Upload Navigation Hiring/Firing Bitcoin Managed IT PCI DSS Running Cable File Sharing Gig Economy How To Social Network Google Wallet Paperless IP Address Multi-Factor Security Co-managed IT Dark Web Internet Service Provider Notifications Teamwork IoT Trends Evernote Technology Care Windows 8 Regulations Compliance Laptop Travel Google Maps Recovery Memes Customer Resource management Regulations Drones Business Communications Techology Google Calendar Scams Microsoft Excel Hard Drives Net Neutrality Data Analysis SQL Server Star Wars History Gamification Hybrid Work Staff Domains Financial Data Halloween Unified Threat Management Smartwatch IT Social Networking Human Resources Unified Threat Management Legislation Cables Refrigeration Procurement Fileless Malware Azure

Blog Archive