Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Training Gadgets Covid-19 Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain Virtualization Wi-Fi Business Technology Bandwidth Data Security Vendor Two-factor Authentication Apps Mobile Office Apple Networking Mobile Device Management App Gmail BYOD WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget How To BDR HIPAA Computing Applications Information Technology Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing Managed IT Services 2FA Operating System Router Big Data Physical Security Virtual Private Network Risk Management Healthcare Health Help Desk Analytics Office Tips Augmented Reality Computers Retail Storage Password Website Bring Your Own Device Cooperation Windows 11 Firewall Going Green Patch Management Save Money Remote Monitoring Vulnerability Excel End of Support The Internet of Things Vendor Management Cybercrime Remote Workers Social Display Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Windows 7 Customer Service Document Management Microsoft 365 Solutions Telephone Scam Data loss Word Entertainment Administration Holidays Data Storage Telephone System Robot Supply Chain Cost Management Video Conferencing Safety Settings Printing Managed Services Provider Wireless Professional Services Content Filtering Virtual Machines IT Management VPN YouTube Meetings Cryptocurrency User Tip Modem iPhone Computer Repair Mobile Security Processor Virtual Desktop LiFi Vulnerabilities Customer Relationship Management Data storage Data Privacy Smart Technology Images 101 Outlook Machine Learning Hacking Presentation Money Saving Time Multi-Factor Authentication Mobility Humor Wireless Technology Managed IT Service Maintenance Antivirus Sports Downloads Employees Mouse Integration Licensing Mobile Computing Social Network Managing Costs Amazon Hard Drives Multi-Factor Security Domains Search Dark Web eCommerce Tablet IoT SSID Surveillance Best Practice Trends Virtual Assistant Outsource IT Alert Managed IT Customer Resource management Virtual Machine Environment Buisness File Sharing Regulations Media Refrigeration Dark Data Google Calendar Medical IT Public Speaking How To Microsoft Excel Reviews Legal Data Analysis IT solutions Star Wars Development Business Growth Gamification Transportation Small Businesses Lithium-ion battery Notifications Staff Entrepreneur Hypervisor Displays Travel Social Networking Legislation PowerPoint Cortana Shopping Techology Fileless Malware Optimization Google Maps Alt Codes Content Employer/Employee Relationships Outsourcing Wearable Technology PCI DSS Health IT Downtime Unified Threat Management Motherboard Navigation Undo Comparison Workplace Permissions Gig Economy Unified Threat Management Directions Hosted Solution Assessment Internet Service Provider Typing Teamwork Hiring/Firing Regulations Compliance Evernote Paperless Network Congestion Specifications Internet Exlporer Co-managed IT Knowledge Fraud Google Drive User Error Microchip Memes Net Neutrality Username SQL Server Technology Care Application 5G Black Friday Financial Data History Point of Sale Business Communications Unified Communications Database Scams IBM Experience Smartwatch Google Docs IT Procurement Bitcoin Network Management Azure Hybrid Work Running Cable Tech Support IT Technicians Monitors Cyber Monday Telework Google Wallet Proxy Server Cyber security Cookies Tech Human Resources Tactics Cables Hotspot CES Communitications Supply Chain Management Windows 8 Laptop Websites Mirgation Competition FinTech Drones Nanotechnology Term Google Apps Addiction IT Maintenance Electronic Medical Records Language SharePoint IT Assessment Flexibility Management Value Business Intelligence Halloween Chatbots Writing Distributed Denial of Service Organization Lenovo Screen Reader Shortcuts Service Level Agreement Ransmoware Virtual Reality Computing Infrastructure User Digital Security Cameras Smart Devices Remote Working Hacks Server Management Memory Vendors Scary Stories Private Cloud Identity Fun Superfish Bookmark Data Breach Identity Theft Smart Tech Google Play Be Proactive Deep Learning Download Workforce IP Address Twitter Alerts Videos Electronic Health Records Wasting Time Threats Error Social Engineering Break Fix Browsers Trend Micro Education Connectivity Security Cameras Workplace Strategies Upload Meta Remote Computing Recovery Software as a Service

Blog Archive