Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Artificial Intelligence Automation Information Training Gadgets Cloud Computing Covid-19 Remote Work Server Compliance Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Government Data Management Virtualization Bandwidth Business Technology Wi-Fi Windows 10 Blockchain Vendor Apps Mobile Office Data Security Two-factor Authentication WiFi Chrome Budget Employer-Employee Relationship Tip of the week Apple Managed Services Voice over Internet Protocol App Networking Mobile Device Management Gmail BYOD Office 365 Applications Access Control Conferencing Hacker Avoiding Downtime Marketing How To BDR Computing Information Technology HIPAA Router Office Tips Analytics Virtual Private Network Big Data Augmented Reality Health Storage 2FA Password Help Desk Bring Your Own Device Computers Retail Healthcare Website Managed IT Services Operating System Risk Management The Internet of Things Physical Security Display Social Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Customer Service Document Management Remote Workers Telephone Going Green Scam Data loss Cooperation Free Resource Cybercrime Project Management Windows 7 Patch Management Firewall Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions VPN Employees Meetings Integration Outlook User Tip Modem Money Computer Repair Mobile Security Processor Humor Holidays Data Storage Smart Technology Supply Chain Sports Customer Relationship Management Video Conferencing Mouse Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Hacking Administration Presentation Managed IT Service Maintenance Antivirus Wireless Technology Downloads iPhone Licensing Settings Printing Vulnerabilities Wireless Entertainment Data Privacy Content Filtering Word YouTube Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cryptocurrency Cost Management Virtual Desktop Safety IT Management Data storage LiFi Windows 8 Network Congestion Specifications Security Cameras Workplace Strategies Laptop Trend Micro Internet Exlporer Software as a Service Drones Fraud Meta User Error Microchip Username Managing Costs Amazon Black Friday SSID Halloween Point of Sale eCommerce Database Surveillance Application Virtual Assistant Outsource IT Network Management Tech Support IT Technicians Virtual Machine Environment Media Hacks Monitors Cyber Monday Medical IT Scary Stories Proxy Server Reviews IBM Cookies Tactics Development Hotspot Transportation Small Businesses Fun Websites Mirgation Hypervisor Displays Deep Learning PowerPoint Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Education SharePoint Management PCI DSS Competition Chatbots Navigation Mobile Computing Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Search Server Management Regulations Compliance Private Cloud Identity Best Practice Evernote Paperless User Co-managed IT Buisness Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Legal Twitter Alerts SQL Server Technology Care IT solutions Financial Data Error History Business Growth Business Communications Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch IP Address Upload Procurement Remote Computing Azure Hybrid Work Cortana Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Alt Codes Tablet IoT Communitications Recovery Dark Web Cables Downtime CES Trends Supply Chain Management Hard Drives Alert Hosted Solution Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Domains File Sharing Regulations Typing Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Refrigeration Google Drive Notifications Staff Value Business Intelligence Knowledge Legislation Shortcuts Organization Public Speaking Travel Social Networking Google Maps Smart Devices Ransmoware 5G Techology Fileless Malware Digital Security Cameras Lithium-ion battery Content Remote Working Google Docs Wearable Technology Memory Vendors Entrepreneur Unified Communications Experience Comparison Google Play Be Proactive Running Cable Health IT Unified Threat Management Motherboard Data Breach Bitcoin Assessment Electronic Health Records Google Wallet Permissions Workforce Unified Threat Management Directions Videos Undo Wasting Time Threats

Blog Archive