Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Excel Shortcuts You Can Use to Be More Efficient

Excel Shortcuts You Can Use to Be More Efficient

Microsoft Excel is the premier spreadsheet software, but unless you know keyboard shortcuts and formulas, it can be tricky to get the most value out of it as a software solution. Thankfully, with just a couple of keystrokes, you too can achieve mastery over this software. Here are some of the most popular and useful keyboard shortcuts for Microsoft Excel.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Passwords Quick Tips AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Automation Facebook Miscellaneous Artificial Intelligence Holiday Compliance Gadgets Covid-19 Cloud Computing Training Outsourced IT Remote Work Server Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Virtualization Bandwidth Blockchain Managed Services Two-factor Authentication Data Security Apps Vendor Mobile Office Mobile Device Management Tip of the week Voice over Internet Protocol Gmail WiFi Chrome Networking Budget Employer-Employee Relationship Apple BYOD App Computing Information Technology Conferencing Office 365 Managed IT Services How To BDR Password Hacker HIPAA Physical Security Avoiding Downtime Applications Marketing Access Control Help Desk Risk Management Healthcare Retail Office Tips Analytics Big Data Augmented Reality Storage Bring Your Own Device Computers Router Virtual Private Network 2FA Website Operating System Health Monitoring Firewall Remote Workers Document Management Managed IT Service The Internet of Things Telephone Scam Free Resource Project Management Data loss Windows 7 Social Cooperation Microsoft 365 Solutions Patch Management Save Money Customer Service Remote Monitoring End of Support Vulnerability Vendor Management Going Green Windows 11 Display Printer Paperless Office Cybercrime Infrastructure Excel YouTube Virtual Machines Professional Services Smart Technology Cryptocurrency Machine Learning Saving Time Safety Virtual Desktop iPhone Data storage LiFi Maintenance Vulnerabilities Downloads Antivirus Data Privacy Outlook Licensing Money Images 101 Entertainment Humor Multi-Factor Authentication Mobility Customer Relationship Management Sports Robot Mouse Telephone System Cost Management Employees Integration Administration Hacking Presentation IT Management Meetings VPN Wireless Technology Holidays Modem User Tip Data Storage Settings Processor Computer Repair Mobile Security Printing Wireless Supply Chain Video Conferencing Content Filtering Word Managed Services Provider Websites Mirgation Gig Economy Workplace Teamwork Hiring/Firing Nanotechnology Google Drive Refrigeration Internet Service Provider Knowledge Public Speaking Regulations Compliance SharePoint Addiction Evernote Paperless Electronic Medical Records Language Chatbots Lithium-ion battery Memes 5G Management Co-managed IT Experience Entrepreneur Lenovo SQL Server Technology Care Screen Reader Writing Distributed Denial of Service Google Docs Unified Communications Net Neutrality Bitcoin Financial Data Running Cable History Service Level Agreement Business Communications Virtual Reality Computing Infrastructure Private Cloud Identity Google Wallet Smartwatch IT Server Management Scams Procurement Superfish Bookmark Azure Hybrid Work Identity Theft Smart Tech Undo Windows 8 Telework Laptop Cyber security Download Tech Human Resources Twitter Alerts Cables Error Drones CES Communitications Supply Chain Management Browsers Connectivity Social Engineering Break Fix FinTech Halloween Upload Term Google Apps Remote Computing IT Maintenance Multi-Factor Security Application IT Assessment Social Network Flexibility Value Business Intelligence Tablet IoT Dark Web Hacks IBM Organization Scary Stories Trends Shortcuts Alert Ransmoware File Sharing Regulations Dark Data Google Calendar Digital Security Cameras Smart Devices Fun Managed IT Customer Resource management Remote Working Data Analysis Memory Vendors Star Wars How To Microsoft Excel Deep Learning Data Breach Gamification Google Play Be Proactive Notifications Staff Workforce Travel Social Networking Legislation Videos Education Electronic Health Records Techology Fileless Malware Wasting Time Threats Google Maps Competition Mobile Computing Trend Micro Content Security Cameras Workplace Strategies Wearable Technology Meta Unified Threat Management Motherboard Comparison Software as a Service Search Health IT Unified Threat Management Directions Managing Costs Amazon Assessment Permissions Best Practice Buisness User eCommerce SSID Virtual Assistant Outsource IT Network Congestion Specifications Legal IT solutions Surveillance User Error Microchip Virtual Machine Environment Internet Exlporer Media Fraud Business Growth IP Address Reviews Username Medical IT Transportation Small Businesses Point of Sale Black Friday Development Cortana Hypervisor Displays Database Alt Codes Shopping Downtime Recovery Optimization Network Management PowerPoint Tech Support IT Technicians Employer/Employee Relationships Outsourcing Cookies Monitors Cyber Monday Hosted Solution Hard Drives Proxy Server Domains PCI DSS Tactics Navigation Hotspot Typing

Blog Archive