Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Disaster Recovery AI Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Holiday Facebook Miscellaneous Automation Information Cloud Computing Training Gadgets Covid-19 Remote Work Managed Service Provider Compliance Server IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Windows 10 Bandwidth Virtualization Business Technology Blockchain Wi-Fi Data Security Mobile Office Two-factor Authentication Apps Vendor Mobile Device Management BYOD Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Tip of the week Employer-Employee Relationship App Networking BDR Applications Marketing Office 365 Conferencing Access Control Hacker Computing HIPAA How To Avoiding Downtime Information Technology Website Analytics Office Tips Help Desk Augmented Reality Physical Security Virtual Private Network Storage Password Healthcare Bring Your Own Device Big Data Health Retail Operating System Computers Managed IT Services Router 2FA Risk Management Excel Patch Management Save Money Remote Monitoring Vulnerability End of Support Firewall Monitoring Vendor Management Display Printer The Internet of Things Remote Workers Paperless Office Infrastructure Telephone Social Document Management Cooperation Free Resource Project Management Windows 7 Going Green Customer Service Microsoft 365 Scam Data loss Cybercrime Solutions Windows 11 Modem User Tip Virtual Desktop Processor Robot Mobile Security Data storage LiFi Word Holidays Outlook Data Storage Smart Technology IT Management VPN Meetings Video Conferencing Money Humor Managed Services Provider Virtual Machines Professional Services Safety Saving Time Data Privacy Computer Repair Managed IT Service Sports Mouse Downloads iPhone Administration Licensing Machine Learning Vulnerabilities Entertainment Customer Relationship Management Images 101 Multi-Factor Authentication Mobility Maintenance Settings Telephone System Hacking Wireless Cost Management Printing Antivirus Presentation Content Filtering YouTube Wireless Technology Cryptocurrency Employees Integration Supply Chain Google Docs Outsourcing Unified Communications Experience Username How To Managing Costs eCommerce Black Friday SSID Bitcoin Running Cable Recovery Notifications Workplace Hard Drives Travel Database Surveillance Virtual Assistant Google Wallet Hiring/Firing Techology Domains Google Maps IT Technicians Virtual Machine Cookies Cyber Monday Medical IT Windows 8 Paperless Laptop Proxy Server Reviews Co-managed IT Refrigeration Unified Threat Management Tactics Development Hotspot Transportation Drones Technology Care Unified Threat Management Public Speaking Mirgation Hypervisor Nanotechnology Optimization PowerPoint Lithium-ion battery Business Communications Halloween Shopping Scams Entrepreneur Addiction Network Congestion Language Employer/Employee Relationships Navigation Hybrid Work User Error Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Hacks Human Resources Scary Stories Gig Economy Cables Undo Point of Sale Fun Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Evernote Deep Learning Regulations Compliance Identity Tech Support Smart Tech Memes Google Apps Network Management Bookmark IT Maintenance Education Download Net Neutrality Monitors Alerts SQL Server Business Intelligence Financial Data History Websites Connectivity IT Break Fix Mobile Computing Shortcuts Application Browsers Smartwatch Ransmoware Search Upload Procurement Azure Multi-Factor Security Tech Vendors SharePoint Best Practice IBM Social Network Telework Electronic Medical Records Cyber security IoT Communitications Dark Web Be Proactive Buisness CES Workforce Lenovo IT solutions Trends Supply Chain Management Writing Legal Google Calendar Term Threats Business Growth Customer Resource management FinTech Virtual Reality Regulations Data Analysis Private Cloud Star Wars IT Assessment Microsoft Excel Workplace Strategies Server Management Meta Superfish Competition Identity Theft Cortana Gamification Flexibility Staff Value Social Networking Legislation Amazon Alt Codes Organization Twitter Fileless Malware Digital Security Cameras Error Smart Devices Downtime Outsource IT Hosted Solution Content Remote Working Social Engineering Wearable Technology Memory Motherboard Data Breach Comparison Google Play Environment Typing Media User Health IT Remote Computing Directions Videos Assessment Electronic Health Records Permissions Google Drive Small Businesses Tablet Knowledge Wasting Time Trend Micro Specifications Security Cameras Displays IP Address Alert Microchip File Sharing 5G Internet Exlporer Software as a Service Dark Data Fraud Managed IT

Blog Archive