Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Covid-19 Cloud Computing Gadgets Training Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Blockchain Windows 10 Virtualization Wi-Fi Business Technology Mobile Office Vendor Data Security Apps Two-factor Authentication Managed Services Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App WiFi BYOD Employer-Employee Relationship Chrome Tip of the week Avoiding Downtime Marketing How To HIPAA BDR Applications Computing Information Technology Conferencing Office 365 Access Control Hacker Storage Website Retail Healthcare Password Bring Your Own Device Managed IT Services Router Operating System Big Data 2FA Risk Management Help Desk Physical Security Virtual Private Network Health Computers Analytics Office Tips Augmented Reality Document Management Remote Workers Cooperation Scam Data loss Firewall Free Resource Project Management Windows 7 Going Green Microsoft 365 Patch Management The Internet of Things Save Money Solutions Remote Monitoring Windows 11 End of Support Vulnerability Cybercrime Vendor Management Social Monitoring Excel Display Printer Customer Service Paperless Office Infrastructure Telephone Data Privacy Entertainment Sports Mouse Maintenance iPhone Word Antivirus Telephone System Administration Cost Management Vulnerabilities Images 101 Safety Multi-Factor Authentication Mobility Robot Settings User Tip Wireless Modem Printing Processor Content Filtering Mobile Security YouTube Employees Integration IT Management Supply Chain VPN Cryptocurrency Meetings Smart Technology Customer Relationship Management Virtual Desktop Saving Time Computer Repair Holidays Data storage LiFi Data Storage Hacking Managed IT Service Outlook Presentation Video Conferencing Managed Services Provider Downloads Virtual Machines Professional Services Money Licensing Humor Machine Learning Wireless Technology Social Network IP Address Regulations Compliance Writing Multi-Factor Security Evernote Lenovo Hacks Scary Stories Google Apps Virtual Reality Fun IoT Memes Dark Web SQL Server Server Management Deep Learning IT Maintenance Private Cloud Trends Net Neutrality Identity Theft Customer Resource management Financial Data Regulations Recovery History Google Calendar Superfish Business Intelligence Education Data Analysis Shortcuts Smartwatch Twitter Star Wars Hard Drives IT Microsoft Excel Staff Azure Ransmoware Error Gamification Domains Procurement Telework Social Engineering Social Networking Cyber security Legislation Tech Mobile Computing Vendors Fileless Malware Be Proactive CES Remote Computing Search Refrigeration Communitications Supply Chain Management Wearable Technology Best Practice Workforce Content Public Speaking Tablet Buisness Health IT Lithium-ion battery FinTech Motherboard Comparison Term Threats Legal IT solutions Directions Workplace Strategies Alert Assessment IT Assessment Permissions Entrepreneur Flexibility Dark Data Value Managed IT Business Growth Meta File Sharing Organization How To Specifications Amazon Microchip Digital Security Cameras Notifications Cortana Internet Exlporer Undo Smart Devices Fraud Remote Working Memory Alt Codes Outsource IT Travel Username Google Maps Downtime Media Data Breach Black Friday Google Play Techology Environment Hosted Solution Videos Database Electronic Health Records IT Technicians Wasting Time Typing Small Businesses Unified Threat Management Displays Proxy Server Cookies Application Trend Micro Cyber Monday Security Cameras Unified Threat Management Google Drive Knowledge Tactics Software as a Service Hotspot Network Congestion Mirgation Managing Costs Outsourcing IBM 5G Nanotechnology eCommerce SSID User Error Virtual Assistant Google Docs Unified Communications Workplace Experience Addiction Surveillance Language Chatbots Virtual Machine Bitcoin Hiring/Firing Point of Sale Running Cable Management Paperless Reviews Screen Reader Distributed Denial of Service Medical IT Google Wallet Transportation Network Management Co-managed IT Tech Support Service Level Agreement Competition Development Computing Infrastructure Monitors Identity Hypervisor Windows 8 Technology Care Laptop Bookmark Business Communications Shopping Smart Tech Optimization PowerPoint Drones Employer/Employee Relationships Scams Websites Download Alerts PCI DSS User Navigation Hybrid Work Halloween Browsers Human Resources Gig Economy Electronic Medical Records Connectivity Break Fix SharePoint Teamwork Cables Upload Internet Service Provider

Blog Archive