Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Efficiency Phishing Privacy Workplace Tips Computer Google Collaboration Hosted Solutions Users IT Services Cybersecurity Ransomware Quick Tips Microsoft Data Backup Small Business Communication Smartphones Mobile Device Android Business Management Mobile Devices Workplace Strategy communications Smartphone VoIP Saving Money Managed IT Services Microsoft Office Managed Service Browser Data Recovery Social Media Passwords Upgrade Backup Disaster Recovery Network Internet of Things Tech Term Automation Cloud Computing Covid-19 Remote Artificial Intelligence Server Remote Work Managed Service Provider Facebook Miscellaneous Windows Gadgets Spam Encryption Windows 10 Information Outsourced IT Holiday Employee/Employer Relationship Data Management Business Continuity Government Business Technology Windows 10 Productivity Blockchain Wi-Fi Two-factor Authentication Virtualization Bandwidth Apps Data Security Current Events Compliance Mobile Device Management Vendor Gmail Managed Services Voice over Internet Protocol Chrome Budget Networking Employer-Employee Relationship Apple App Office Information Technology Applications Office 365 How To Conferencing BDR Hacker Avoiding Downtime Mobile Office Computing Access Control Risk Management Router Retail Analytics Office Tips WiFi Augmented Reality Big Data Help Desk Managed IT Services Storage Password Bring Your Own Device Computers BYOD Virtual Private Network Operating System Website Training Marketing Health HIPAA Windows 11 Firewall Tip of the week Document Management Excel The Internet of Things Remote Workers IT Support Monitoring Scam Data loss Healthcare Social Free Resource Project Management Patch Management Windows 7 Telephone Save Money Customer Service Remote Monitoring End of Support Vulnerability Microsoft 365 Vendor Management AI Cooperation Solutions Going Green Display Printer Cybercrime Paperless Office Infrastructure Holidays Cryptocurrency Data Storage Machine Learning Virtual Desktop Video Conferencing 2FA Supply Chain Managed Services Provider Data storage User Tip LiFi Modem Mobile Security Virtual Machines Safety Processor Professional Services Outlook Maintenance Antivirus Money Humor Smart Technology iPhone Saving Time Sports Vulnerabilities Mouse Customer Relationship Management Managed IT Service Robot Images 101 Data Privacy Administration Downloads Multi-Factor Authentication Mobility Licensing Hacking Presentation Entertainment IT Management VPN Meetings Wireless Technology Employees Settings Wireless Integration Printing Telephone System Computer Repair Content Filtering Cost Management YouTube Word Permissions Reviews Outsource IT Directions Medical IT Assessment Websites Refrigeration 5G Environment Development Media Transportation SharePoint Hypervisor Google Docs Public Speaking Unified Communications Electronic Medical Records Experience Specifications Fraud Shopping Small Businesses Optimization Lithium-ion battery Microchip PowerPoint Bitcoin Internet Exlporer Running Cable Username Entrepreneur Writing Displays Lenovo Employer/Employee Relationships Google Wallet Navigation Virtual Reality Black Friday PCI DSS Gig Economy Outsourcing Server Management Windows 8 Database Private Cloud Laptop Undo Identity Theft IT Technicians Internet Service Provider Superfish Teamwork Drones Workplace Proxy Server Evernote Cookies Twitter Cyber Monday Regulations Compliance Hotspot Hiring/Firing Memes Tactics Error Halloween Mirgation Social Engineering Net Neutrality Paperless SQL Server Co-managed IT History Nanotechnology Remote Computing Financial Data Language Smartwatch Technology Care IT Hacks Application Addiction Scary Stories Management Tablet Chatbots Fun Procurement Business Communications Azure Telework Scams Cyber security IBM Tech Deep Learning Screen Reader Alert Distributed Denial of Service Computing Infrastructure Dark Data CES Hybrid Work Communitications Managed IT Service Level Agreement File Sharing Education Identity How To Supply Chain Management Human Resources FinTech Cables Bookmark Term Smart Tech Notifications Alerts IT Assessment Mobile Computing Download Travel Value Competition Google Maps Search Flexibility Google Apps Techology Organization IT Maintenance Browsers Best Practice Connectivity Break Fix Buisness Digital Security Cameras Business Intelligence Smart Devices Upload Unified Threat Management Memory Legal Social Network IT solutions Multi-Factor Security Remote Working Shortcuts Unified Threat Management Ransmoware Data Breach Google Play Business Growth User IoT Dark Web Network Congestion Videos Vendors Electronic Health Records Trends User Error Wasting Time Customer Resource management Regulations Physical Security Cortana Google Calendar Be Proactive Workforce Trend Micro IP Address Data Analysis Security Cameras Alt Codes Star Wars Microsoft Excel Point of Sale Downtime Staff Threats Software as a Service Gamification Workplace Strategies Managing Costs Hosted Solution Social Networking Legislation Meta eCommerce Fileless Malware Network Management SSID Typing Recovery Tech Support Hard Drives Content Wearable Technology Monitors Amazon Surveillance Virtual Assistant Virtual Machine Google Drive Domains Health IT Motherboard Knowledge Comparison

Blog Archive