Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Artificial Intelligence Facebook Miscellaneous Training Covid-19 Gadgets Cloud Computing Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Two-factor Authentication Vendor Mobile Office Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Managed Services Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Computing Hacker Information Technology Avoiding Downtime HIPAA Access Control Marketing Applications Office 365 Conferencing How To BDR Computers Physical Security Risk Management Virtual Private Network Router Website Health Analytics Office Tips Augmented Reality 2FA Retail Help Desk Storage Password Bring Your Own Device Big Data Managed IT Services Healthcare Operating System Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Windows 11 Firewall Document Management Monitoring Excel The Internet of Things Scam Data loss Remote Workers Social Telephone Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring End of Support Project Management Vulnerability Customer Service Windows 7 Vendor Management Cybercrime Mobility YouTube Meetings Telephone System Multi-Factor Authentication Presentation VPN Cost Management Cryptocurrency Wireless Technology Computer Repair Virtual Desktop Employees Data storage Integration LiFi Word User Tip Modem Processor Outlook Mobile Security Machine Learning Holidays Money Humor Data Storage Smart Technology Supply Chain Video Conferencing Safety Maintenance Sports Managed Services Provider Antivirus Virtual Machines Mouse Professional Services Saving Time Managed IT Service Administration Downloads iPhone Licensing Robot Customer Relationship Management Vulnerabilities Entertainment Data Privacy Settings Wireless Printing Content Filtering Images 101 Hacking IT Management Legislation Shortcuts Network Congestion Organization Social Networking Smart Devices Google Drive User Error Ransmoware User Knowledge Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Point of Sale 5G Health IT Motherboard Data Breach Assessment Electronic Health Records IP Address Google Docs Permissions Workforce Unified Communications Experience Directions Videos Wasting Time Threats Bitcoin Network Management Running Cable Tech Support Google Wallet Specifications Security Cameras Workplace Strategies Monitors Trend Micro Internet Exlporer Software as a Service Fraud Meta Recovery Microchip Laptop Websites Username Managing Costs Amazon Hard Drives Windows 8 Domains Drones Black Friday SSID eCommerce Database Surveillance SharePoint Virtual Assistant Outsource IT Electronic Medical Records Halloween IT Technicians Virtual Machine Environment Refrigeration Media Cookies Public Speaking Lenovo Cyber Monday Medical IT Writing Proxy Server Reviews Tactics Development Lithium-ion battery Hotspot Transportation Small Businesses Virtual Reality Entrepreneur Scary Stories Private Cloud Mirgation Hypervisor Displays Hacks Server Management Nanotechnology Optimization Superfish PowerPoint Identity Theft Fun Shopping Addiction Language Employer/Employee Relationships Outsourcing Deep Learning Twitter Navigation Error Management PCI DSS Chatbots Undo Screen Reader Distributed Denial of Service Workplace Education Social Engineering Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Remote Computing Evernote Paperless Regulations Compliance Identity Mobile Computing Smart Tech Memes Co-managed IT Tablet Search Bookmark Download Net Neutrality Alerts SQL Server Technology Care Application Best Practice Alert Business Communications Buisness File Sharing Dark Data Financial Data History Managed IT Connectivity IT IBM Legal Break Fix Scams IT solutions How To Browsers Smartwatch Upload Procurement Azure Hybrid Work Business Growth Notifications Multi-Factor Security Tech Human Resources Travel Social Network Telework Cyber security IoT Communitications Techology Dark Web Cables Google Maps Cortana CES Trends Supply Chain Management Alt Codes Google Calendar Term Google Apps Downtime Unified Threat Management Customer Resource management FinTech Regulations Competition Star Wars IT Assessment Unified Threat Management Microsoft Excel IT Maintenance Hosted Solution Data Analysis Gamification Flexibility Staff Value Business Intelligence Typing

Blog Archive