Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Mobile Device Managed Service Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Smartphone AI Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Artificial Intelligence Miscellaneous Information Holiday Gadgets Covid-19 Cloud Computing Training Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Business Technology Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Apps Data Security Mobile Office Vendor Two-factor Authentication Tip of the week WiFi Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Managed Services Voice over Internet Protocol Mobile Device Management Gmail Office 365 Conferencing How To BDR Hacker Avoiding Downtime HIPAA Marketing Computing Applications Information Technology Access Control Help Desk Analytics Office Tips Augmented Reality Big Data Retail Storage Password Bring Your Own Device Managed IT Services Computers 2FA Operating System Website Router Physical Security Risk Management Healthcare Virtual Private Network Health Free Resource Monitoring Project Management The Internet of Things Windows 7 Document Management Microsoft 365 Social Solutions Telephone Scam Data loss Customer Service Cooperation Windows 11 Going Green Patch Management Save Money Remote Monitoring End of Support Excel Vulnerability Vendor Management Cybercrime Remote Workers Display Printer Firewall Paperless Office Infrastructure Data Privacy Safety Smart Technology Outlook Images 101 Machine Learning Money Saving Time Multi-Factor Authentication Mobility Humor Managed IT Service Maintenance Sports Downloads Antivirus Mouse Employees Integration Customer Relationship Management Licensing Entertainment Administration Hacking Presentation Holidays Data Storage Robot Telephone System Wireless Technology Cost Management Supply Chain Video Conferencing Settings Managed Services Provider Wireless Printing Virtual Machines Content Filtering Professional Services IT Management YouTube Meetings VPN Word Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security iPhone Virtual Desktop Data storage LiFi Vulnerabilities Windows 8 Supply Chain Management Laptop Websites Mirgation Drones Undo FinTech Nanotechnology Term Google Apps SharePoint Addiction IT Assessment Electronic Medical Records Language IT Maintenance Halloween Chatbots Value Business Intelligence Management Flexibility Lenovo Organization Screen Reader Writing Distributed Denial of Service Shortcuts Digital Security Cameras Service Level Agreement Smart Devices Virtual Reality Computing Infrastructure Ransmoware Scary Stories Private Cloud Identity Memory Vendors Hacks Server Management Application Remote Working Superfish Bookmark Identity Theft Smart Tech Data Breach Fun Google Play Be Proactive IBM Videos Deep Learning Download Electronic Health Records Twitter Alerts Workforce Error Wasting Time Threats Browsers Education Connectivity Trend Micro Social Engineering Break Fix Security Cameras Workplace Strategies Meta Upload Software as a Service Remote Computing Managing Costs Amazon Multi-Factor Security Mobile Computing Social Network Competition Tablet IoT eCommerce Search Dark Web SSID Virtual Assistant Outsource IT Best Practice Trends Surveillance Alert Buisness File Sharing Regulations Virtual Machine Environment Dark Data Google Calendar Media Managed IT Customer Resource management Legal Data Analysis Reviews IT solutions Star Wars How To Microsoft Excel Medical IT Transportation Small Businesses Business Growth Gamification User Development Notifications Staff Travel Social Networking Hypervisor Displays Legislation Techology Fileless Malware Shopping Google Maps Optimization Cortana PowerPoint Employer/Employee Relationships Outsourcing IP Address Alt Codes Content Wearable Technology PCI DSS Downtime Unified Threat Management Motherboard Comparison Navigation Health IT Unified Threat Management Directions Gig Economy Hosted Solution Assessment Permissions Workplace Teamwork Hiring/Firing Typing Recovery Internet Service Provider Regulations Compliance Network Congestion Specifications Evernote Paperless Hard Drives Google Drive User Error Microchip Domains Internet Exlporer Memes Knowledge Fraud Co-managed IT SQL Server Technology Care Username Net Neutrality Refrigeration Financial Data Point of Sale History 5G Black Friday Business Communications Google Docs Public Speaking Smartwatch Unified Communications Database IT Experience Scams Azure Hybrid Work Lithium-ion battery Bitcoin Network Management Procurement Running Cable Tech Support IT Technicians Telework Cookies Entrepreneur Cyber security Monitors Cyber Monday Tech Human Resources Google Wallet Proxy Server CES Tactics Communitications Hotspot Cables

Blog Archive