Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps Managed Services BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing How To BDR Operating System Computers Router Healthcare Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services 2FA Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Remote Workers Physical Security Display Printer Paperless Office Free Resource Infrastructure Project Management Monitoring Windows 7 Microsoft 365 Firewall Document Management Solutions Telephone The Internet of Things Scam Data loss Social Cooperation Windows 11 Going Green Patch Management Save Money Excel Virtual Machines Settings Professional Services Printing Wireless Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency iPhone Wireless Technology User Tip Modem Mobile Security Computer Repair Processor Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Smart Technology Mobility Outlook Multi-Factor Authentication Machine Learning Saving Time Money Humor Managed IT Service Safety Employees Maintenance Antivirus Sports Integration Downloads Mouse Licensing Entertainment Administration Holidays Data Storage Supply Chain Telephone System Video Conferencing Robot Customer Relationship Management Cost Management Managed Services Provider Content Alt Codes Wearable Technology Workplace Gig Economy Competition Health IT Internet Service Provider Motherboard Downtime Unified Threat Management Teamwork Hiring/Firing Comparison Permissions Evernote Paperless Directions Unified Threat Management Regulations Compliance Assessment Hosted Solution Typing Memes Co-managed IT Net Neutrality SQL Server Technology Care Network Congestion Specifications Fraud Knowledge Business Communications Microchip Google Drive User Error Financial Data User Internet Exlporer History Username IT Scams Smartwatch Procurement Point of Sale Azure Hybrid Work 5G Black Friday Experience Tech Human Resources IP Address Google Docs Telework Database Unified Communications Cyber security Bitcoin Network Management Communitications IT Technicians Running Cable Tech Support Cables CES Proxy Server Google Wallet Supply Chain Management Cookies Monitors Cyber Monday Hotspot Term Google Apps FinTech Recovery Tactics Hard Drives Windows 8 IT Assessment Mirgation Laptop Websites IT Maintenance Domains Drones Flexibility Nanotechnology Value Business Intelligence Language Electronic Medical Records Shortcuts SharePoint Organization Addiction Refrigeration Management Smart Devices Chatbots Halloween Ransmoware Digital Security Cameras Public Speaking Lenovo Remote Working Screen Reader Memory Vendors Writing Distributed Denial of Service Computing Infrastructure Virtual Reality Google Play Be Proactive Lithium-ion battery Service Level Agreement Data Breach Videos Hacks Server Management Electronic Health Records Entrepreneur Identity Scary Stories Private Cloud Workforce Bookmark Superfish Smart Tech Identity Theft Wasting Time Threats Fun Trend Micro Alerts Twitter Security Cameras Workplace Strategies Download Deep Learning Undo Software as a Service Error Meta Browsers Connectivity Education Managing Costs Amazon Social Engineering Break Fix eCommerce Remote Computing SSID Upload Social Network Mobile Computing Surveillance Virtual Assistant Outsource IT Multi-Factor Security Media IoT Tablet Virtual Machine Environment Search Dark Web Trends Best Practice Alert Medical IT Reviews Application Customer Resource management Managed IT Development Regulations Buisness File Sharing Transportation Small Businesses Dark Data Google Calendar Microsoft Excel How To IBM Data Analysis Legal Star Wars IT solutions Hypervisor Displays Gamification Business Growth Optimization Staff Notifications PowerPoint Shopping Social Networking Travel Employer/Employee Relationships Outsourcing Legislation Cortana Navigation Fileless Malware Techology PCI DSS Google Maps

Blog Archive