Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Information Artificial Intelligence Miscellaneous Holiday Automation Gadgets Covid-19 Cloud Computing Training Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Bandwidth Wi-Fi Windows 10 Business Technology Blockchain Vendor Apps Data Security Mobile Office Two-factor Authentication Managed Services Tip of the week Voice over Internet Protocol WiFi Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail HIPAA Applications How To BDR Hacker Avoiding Downtime Conferencing Marketing Computing Information Technology Access Control Office 365 Analytics Office Tips Augmented Reality Healthcare Big Data Router Retail Storage Password Bring Your Own Device Managed IT Services Help Desk Computers Operating System Website Virtual Private Network Risk Management Health 2FA The Internet of Things Excel Remote Workers Document Management Social Scam Free Resource Project Management Data loss Windows 7 Customer Service Monitoring Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Telephone Physical Security Display Firewall Printer Cooperation Paperless Office Windows 11 Infrastructure Outlook Machine Learning Money Humor iPhone Maintenance Modem Antivirus Sports Vulnerabilities User Tip Processor Mouse Mobile Security Customer Relationship Management Images 101 Administration Mobility Data Privacy Multi-Factor Authentication Smart Technology Hacking Presentation Robot Saving Time Wireless Technology Settings Employees Printing Managed IT Service Integration Wireless Content Filtering IT Management Downloads VPN YouTube Meetings Word Licensing Holidays Cryptocurrency Entertainment Computer Repair Data Storage Video Conferencing Virtual Desktop Data storage LiFi Managed Services Provider Virtual Machines Safety Professional Services Telephone System Cost Management Supply Chain Evernote Electronic Medical Records Outsourcing Content Regulations Compliance SharePoint Wearable Technology Motherboard Memes Halloween Comparison Health IT Directions Assessment Net Neutrality Lenovo Permissions SQL Server Writing Workplace Virtual Reality Hiring/Firing Financial Data History IT Server Management Scary Stories Specifications Private Cloud Application Paperless Smartwatch Hacks Microchip Internet Exlporer Procurement Superfish Fraud Azure Identity Theft Fun Co-managed IT Tech Twitter Technology Care Username Telework Deep Learning Cyber security IBM Communitications Black Friday Error Business Communications CES Database Supply Chain Management Education Social Engineering Scams Term Remote Computing Hybrid Work FinTech IT Technicians Mobile Computing Cookies IT Assessment Cyber Monday Human Resources Proxy Server Cables Tactics Flexibility Hotspot Value Tablet Search Competition Alert Organization Best Practice Mirgation Nanotechnology Smart Devices Managed IT Buisness File Sharing Dark Data Google Apps Digital Security Cameras IT Maintenance Legal Addiction Remote Working IT solutions Language Memory How To Google Play Notifications User Business Intelligence Management Business Growth Chatbots Data Breach Screen Reader Electronic Health Records Distributed Denial of Service Travel Shortcuts Videos Ransmoware Service Level Agreement Techology Computing Infrastructure Wasting Time Google Maps Cortana IP Address Security Cameras Vendors Alt Codes Identity Trend Micro Smart Tech Software as a Service Downtime Unified Threat Management Be Proactive Bookmark Workforce Download Unified Threat Management Hosted Solution Alerts Managing Costs eCommerce SSID Recovery Threats Typing Connectivity Surveillance Break Fix Virtual Assistant Hard Drives Network Congestion Workplace Strategies Browsers Meta Google Drive Upload User Error Virtual Machine Knowledge Domains Multi-Factor Security Medical IT Amazon Social Network Reviews IoT Development Dark Web Transportation Point of Sale 5G Refrigeration Outsource IT Google Docs Trends Unified Communications Hypervisor Experience Public Speaking Optimization Network Management Running Cable Lithium-ion battery Google Calendar PowerPoint Tech Support Environment Media Customer Resource management Shopping Bitcoin Regulations Google Wallet Star Wars Microsoft Excel Employer/Employee Relationships Monitors Entrepreneur Data Analysis Navigation Small Businesses Gamification PCI DSS Staff Laptop Legislation Websites Displays Gig Economy Windows 8 Social Networking Fileless Malware Drones Internet Service Provider Teamwork Undo

Blog Archive