Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Email Workplace Tips Phishing Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Mobile Device Managed Service Microsoft Productivity Passwords AI Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Artificial Intelligence Holiday Facebook Automation Compliance Cloud Computing Covid-19 Training Gadgets Outsourced IT Server Managed Service Provider Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Two-factor Authentication Data Security Mobile Office Vendor Apps Managed Services Networking Mobile Device Management Chrome BYOD Gmail Budget WiFi Apple Tip of the week App Employer-Employee Relationship Voice over Internet Protocol Computing Hacker Managed IT Services Information Technology How To Avoiding Downtime BDR Marketing Office 365 HIPAA Physical Security Applications Password Access Control Conferencing Computers 2FA Risk Management Website Analytics Office Tips Augmented Reality Router Storage Virtual Private Network Bring Your Own Device Health Big Data Help Desk Retail Operating System Healthcare Scam Windows 11 Data loss Cooperation Free Resource Excel Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Display Printer The Internet of Things Paperless Office Infrastructure Monitoring Social Document Management Going Green Remote Workers Managed IT Service Customer Service Telephone Cybercrime YouTube Presentation iPhone Licensing Cryptocurrency Vulnerabilities Entertainment Supply Chain Wireless Technology Virtual Desktop Images 101 Data storage LiFi Telephone System Multi-Factor Authentication Robot Mobility Word Cost Management Outlook Money IT Management Humor VPN Employees Meetings Integration Safety Data Privacy User Tip Modem Sports Computer Repair Mobile Security Processor Mouse Holidays Administration Data Storage Smart Technology Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Customer Relationship Management Settings Wireless Printing Content Filtering Maintenance Antivirus Hacking Downloads Browsers Smartwatch Connectivity IT Social Engineering Break Fix Upload Procurement Google Drive Remote Computing Azure User Knowledge Small Businesses Displays Social Network Telework Cyber security Multi-Factor Security Tech Dark Web 5G CES Tablet IoT Communitications Trends Supply Chain Management IP Address Google Docs Alert Unified Communications Experience Outsourcing Managed IT Customer Resource management FinTech File Sharing Regulations Bitcoin Dark Data Google Calendar Term Running Cable How To Microsoft Excel Data Analysis Workplace Star Wars IT Assessment Google Wallet Gamification Flexibility Notifications Staff Value Recovery Hiring/Firing Organization Paperless Travel Social Networking Hard Drives Windows 8 Legislation Laptop Techology Fileless Malware Digital Security Cameras Co-managed IT Google Maps Smart Devices Domains Drones Content Remote Working Wearable Technology Memory Technology Care Health IT Business Communications Unified Threat Management Motherboard Data Breach Refrigeration Comparison Google Play Halloween Permissions Unified Threat Management Directions Videos Scams Assessment Electronic Health Records Public Speaking Lithium-ion battery Wasting Time Hybrid Work Human Resources Trend Micro Hacks Network Congestion Specifications Security Cameras Entrepreneur Scary Stories Fraud Fun User Error Microchip Cables Internet Exlporer Software as a Service Username Managing Costs Deep Learning Google Apps Point of Sale eCommerce Undo Black Friday SSID Virtual Assistant Education IT Maintenance Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Business Intelligence Proxy Server Reviews Shortcuts Cookies Mobile Computing Monitors Cyber Monday Medical IT Hotspot Transportation Search Ransmoware Tactics Development Websites Mirgation Hypervisor Application Best Practice Vendors Shopping Be Proactive Nanotechnology Optimization PowerPoint Buisness Legal Electronic Medical Records Language Employer/Employee Relationships IT solutions SharePoint Workforce Addiction IBM Management PCI DSS Chatbots Business Growth Navigation Threats Lenovo Gig Economy Workplace Strategies Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Cortana Meta Service Level Agreement Internet Service Provider Amazon Server Management Regulations Compliance Private Cloud Identity Alt Codes Evernote Downtime Superfish Bookmark Identity Theft Smart Tech Memes Competition Twitter Alerts SQL Server Hosted Solution Outsource IT Download Net Neutrality Environment Financial Data Media Error History Typing

Blog Archive