Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Productivity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Information Facebook Artificial Intelligence Automation Cloud Computing Miscellaneous Gadgets Holiday Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Government Business Continuity Wi-Fi Virtualization Bandwidth Business Technology Blockchain Windows 10 Data Security Vendor Two-factor Authentication Apps Mobile Office Gmail Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Chrome Budget Tip of the week Apple App Mobile Device Management Networking BDR Computing HIPAA Information Technology WiFi Applications Office 365 Access Control Conferencing Hacker Avoiding Downtime Marketing How To Risk Management Healthcare Router Big Data Office Tips Analytics Virtual Private Network Augmented Reality Help Desk Health Storage Password Computers Bring Your Own Device Retail Website 2FA Managed IT Services Operating System Remote Workers Patch Management Save Money The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Social Free Resource Physical Security Project Management Windows 7 Display Printer Monitoring Microsoft 365 Paperless Office Infrastructure Solutions Customer Service Document Management Telephone Cooperation Going Green Windows 11 Scam Data loss Firewall Excel Cybercrime YouTube Cryptocurrency Robot Safety iPhone Virtual Desktop User Tip Vulnerabilities Modem IT Management Data storage LiFi Meetings Processor VPN Mobile Security Outlook Data Privacy Images 101 Money Computer Repair Multi-Factor Authentication Mobility Customer Relationship Management Humor Smart Technology Saving Time Hacking Sports Presentation Mouse Employees Integration Managed IT Service Machine Learning Wireless Technology Downloads Administration Licensing Maintenance Holidays Entertainment Antivirus Data Storage Word Video Conferencing Settings Printing Supply Chain Managed Services Provider Wireless Content Filtering Telephone System Professional Services Virtual Machines Cost Management Wearable Technology Workplace Regulations Compliance Entrepreneur How To Content Evernote Knowledge Health IT Motherboard Google Drive Hiring/Firing Comparison Notifications Memes Travel Paperless Net Neutrality Directions SQL Server Assessment Permissions Techology Undo Google Maps Co-managed IT Financial Data History 5G Experience Google Docs Technology Care Specifications Smartwatch Unified Communications IT Unified Threat Management Bitcoin Business Communications Procurement Running Cable Microchip Azure Internet Exlporer Fraud Unified Threat Management Google Wallet Scams Telework Cyber security Username Tech Hybrid Work Black Friday CES Communitications Application Windows 8 Human Resources Supply Chain Management Network Congestion Laptop Database User Error IT Technicians Drones Cables FinTech Term Proxy Server Cookies IBM Cyber Monday IT Assessment Point of Sale Google Apps Flexibility Halloween Value Tactics Hotspot Mirgation IT Maintenance Organization Nanotechnology Network Management Business Intelligence Digital Security Cameras Tech Support Smart Devices Hacks Shortcuts Remote Working Monitors Scary Stories Memory Addiction Language Chatbots Competition Ransmoware Data Breach Fun Management Google Play Electronic Health Records Screen Reader Vendors Distributed Denial of Service Videos Websites Deep Learning Be Proactive Wasting Time Service Level Agreement Computing Infrastructure Security Cameras SharePoint Identity Workforce Electronic Medical Records Education Trend Micro Software as a Service Bookmark Smart Tech Threats User Mobile Computing Workplace Strategies Writing Managing Costs Download Lenovo Alerts SSID Meta Virtual Reality eCommerce Search Surveillance Browsers Virtual Assistant Connectivity IP Address Server Management Amazon Break Fix Private Cloud Best Practice Identity Theft Buisness Virtual Machine Upload Superfish Social Network Medical IT Legal Outsource IT Multi-Factor Security Reviews Twitter IT solutions Media Development Transportation IoT Environment Dark Web Recovery Error Business Growth Hard Drives Social Engineering Hypervisor Trends Customer Resource management PowerPoint Regulations Domains Small Businesses Google Calendar Shopping Remote Computing Optimization Cortana Alt Codes Data Analysis Employer/Employee Relationships Star Wars Displays Microsoft Excel Staff Refrigeration Tablet PCI DSS Downtime Gamification Navigation Social Networking Public Speaking Outsourcing Legislation Gig Economy Alert Hosted Solution File Sharing Typing Internet Service Provider Dark Data Fileless Malware Teamwork Lithium-ion battery Managed IT

Blog Archive