Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Backup Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Facebook Artificial Intelligence Miscellaneous Holiday Automation Covid-19 Cloud Computing Gadgets Training Server Compliance Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Government Business Continuity Wi-Fi Blockchain Windows 10 Virtualization Bandwidth Business Technology Mobile Office Two-factor Authentication Data Security Vendor Apps Tip of the week Mobile Device Management Networking Gmail WiFi Chrome Budget BYOD Employer-Employee Relationship Apple Managed Services App Voice over Internet Protocol Avoiding Downtime Marketing Computing Information Technology How To BDR HIPAA Office 365 Applications Access Control Conferencing Hacker Healthcare Website Operating System Retail Risk Management Managed IT Services Office Tips Router Analytics Augmented Reality Big Data Storage Password 2FA Help Desk Virtual Private Network Bring Your Own Device Health Computers Going Green Telephone Document Management Cybercrime Cooperation Free Resource Project Management Scam Windows 7 Data loss Firewall Microsoft 365 Solutions The Internet of Things Patch Management Save Money Remote Monitoring Vulnerability End of Support Social Vendor Management Windows 11 Physical Security Monitoring Display Printer Excel Customer Service Paperless Office Infrastructure Remote Workers Wireless Technology Downloads Machine Learning Settings iPhone Printing Wireless Licensing Content Filtering Entertainment Vulnerabilities Maintenance YouTube Data Privacy Antivirus Word Cryptocurrency Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Virtual Desktop Data storage LiFi Safety Employees Outlook Robot Integration Money User Tip Modem Humor Processor Mobile Security IT Management Holidays VPN Meetings Sports Mouse Data Storage Supply Chain Customer Relationship Management Smart Technology Computer Repair Video Conferencing Managed Services Provider Administration Saving Time Virtual Machines Professional Services Hacking Presentation Managed IT Service Electronic Medical Records Technology Care Download Net Neutrality SharePoint Alerts SQL Server History Financial Data Cortana Business Communications Writing Browsers Smartwatch Scams Connectivity IT IP Address Lenovo Break Fix Alt Codes Virtual Reality Downtime Hybrid Work Upload Procurement Azure Cyber security Server Management Multi-Factor Security Tech Private Cloud Hosted Solution Social Network Telework Human Resources CES Cables IoT Communitications Superfish Dark Web Recovery Identity Theft Typing Hard Drives Twitter Trends Supply Chain Management Google Apps Regulations Domains Google Calendar Term Google Drive Error Customer Resource management FinTech Knowledge Social Engineering Data Analysis IT Maintenance Star Wars IT Assessment Microsoft Excel Refrigeration Remote Computing Business Intelligence Gamification Flexibility 5G Staff Value Organization Experience Shortcuts Social Networking Public Speaking Legislation Google Docs Unified Communications Bitcoin Fileless Malware Digital Security Cameras Running Cable Ransmoware Smart Devices Lithium-ion battery Tablet Wearable Technology Memory Google Wallet Entrepreneur Alert Vendors Content Remote Working Health IT Be Proactive Motherboard Data Breach Managed IT Comparison Google Play File Sharing Dark Data Windows 8 How To Directions Videos Laptop Workforce Assessment Electronic Health Records Permissions Wasting Time Undo Drones Notifications Threats Workplace Strategies Trend Micro Specifications Security Cameras Travel Microchip Halloween Meta Internet Exlporer Software as a Service Techology Fraud Google Maps Managing Costs Amazon Username eCommerce Black Friday SSID Unified Threat Management Hacks Scary Stories Outsource IT Database Surveillance Unified Threat Management Virtual Assistant Application IT Technicians Virtual Machine Environment Fun Media Proxy Server Reviews Cookies IBM Cyber Monday Medical IT Deep Learning Network Congestion Small Businesses Tactics Development User Error Hotspot Transportation Mirgation Hypervisor Education Displays Shopping Nanotechnology Optimization PowerPoint Point of Sale Mobile Computing Outsourcing Addiction Language Employer/Employee Relationships Chatbots Competition Network Management Navigation Tech Support Management PCI DSS Search Gig Economy Workplace Screen Reader Distributed Denial of Service Best Practice Monitors Buisness Hiring/Firing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Identity Evernote Legal Websites IT solutions Regulations Compliance Paperless Bookmark Co-managed IT Smart Tech Memes User Business Growth

Blog Archive