Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Compliance Cloud Computing Covid-19 Gadgets Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Tip of the week Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Networking Gmail Apple WiFi App BYOD Employer-Employee Relationship Information Technology Access Control Hacker Avoiding Downtime Office 365 Conferencing Marketing How To BDR HIPAA Physical Security Applications Computing Health Risk Management Computers Help Desk Office Tips Analytics Website Retail Augmented Reality Healthcare Storage Password Managed IT Services Bring Your Own Device Big Data Router Operating System Virtual Private Network 2FA Customer Service Paperless Office Infrastructure Excel Monitoring Document Management Managed IT Service Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Going Green Vendor Management Solutions Social Windows 11 Display Cybercrime Printer Cryptocurrency Holidays Hacking Data Storage Presentation Smart Technology Video Conferencing Virtual Desktop Data storage Machine Learning Managed Services Provider LiFi Wireless Technology Professional Services Saving Time Virtual Machines Outlook Maintenance Money Word Antivirus Humor Downloads Data Privacy iPhone Licensing Vulnerabilities Sports Entertainment Mouse Safety Images 101 Administration Robot Mobility Telephone System Multi-Factor Authentication Cost Management IT Management Settings VPN Employees Meetings Printing Integration Wireless Content Filtering Customer Relationship Management User Tip Modem Computer Repair Mobile Security YouTube Processor Supply Chain Outsourcing Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Tactics Development Hotspot Transportation 5G Experience Google Docs Websites Mirgation Hypervisor Workplace Unified Communications Hiring/Firing Bitcoin PowerPoint Running Cable User Shopping Nanotechnology Optimization Addiction Google Wallet Electronic Medical Records Language Employer/Employee Relationships Paperless SharePoint Management PCI DSS Chatbots Co-managed IT Navigation Technology Care Windows 8 IP Address Writing Distributed Denial of Service Laptop Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Drones Virtual Reality Computing Infrastructure Teamwork Business Communications Server Management Regulations Compliance Private Cloud Identity Scams Evernote Hybrid Work Halloween Recovery Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Human Resources Hard Drives Financial Data Error History Cables Domains Hacks Social Engineering Break Fix Scary Stories Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Google Apps Refrigeration Fun Social Network Telework Cyber security IT Maintenance Deep Learning Public Speaking Multi-Factor Security Tech Tablet IoT Communitications Business Intelligence Lithium-ion battery Dark Web CES Trends Supply Chain Management Alert Shortcuts Education Entrepreneur Dark Data Google Calendar Term Managed IT Customer Resource management FinTech File Sharing Regulations Ransmoware Star Wars IT Assessment Vendors Mobile Computing How To Microsoft Excel Data Analysis Gamification Flexibility Notifications Staff Value Be Proactive Undo Search Legislation Organization Travel Social Networking Workforce Best Practice Google Maps Smart Devices Threats Buisness Techology Fileless Malware Digital Security Cameras Content Remote Working Legal Wearable Technology Memory Workplace Strategies IT solutions Comparison Google Play Health IT Unified Threat Management Motherboard Data Breach Meta Business Growth Assessment Electronic Health Records Amazon Permissions Application Unified Threat Management Directions Videos Wasting Time Cortana IBM Network Congestion Specifications Security Cameras Trend Micro Outsource IT Alt Codes Internet Exlporer Software as a Service Environment Fraud Media Downtime User Error Microchip Username Managing Costs Hosted Solution Small Businesses Typing Black Friday SSID Point of Sale eCommerce Database Surveillance Displays Virtual Assistant Knowledge Network Management Google Drive Tech Support IT Technicians Virtual Machine Competition

Blog Archive