Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Productivity Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Holiday Covid-19 Training Server Remote Work Managed Service Provider Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Bandwidth Virtualization Blockchain Wi-Fi Business Technology Windows 10 Data Security Apps Vendor Mobile Office Two-factor Authentication Budget Managed Services Voice over Internet Protocol Networking Apple Employer-Employee Relationship App BYOD Mobile Device Management Tip of the week Chrome Gmail WiFi How To BDR HIPAA Hacker Applications Computing Avoiding Downtime Information Technology Access Control Marketing Office 365 Conferencing Storage Password Managed IT Services Healthcare Big Data Bring Your Own Device 2FA Computers Router Operating System Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Telephone The Internet of Things Scam Data loss Remote Workers Cooperation Social Patch Management Windows 11 Free Resource Save Money Project Management Remote Monitoring Going Green Windows 7 Vulnerability End of Support Vendor Management Customer Service Excel Microsoft 365 Physical Security Cybercrime Solutions Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management Professional Services Safety Maintenance Virtual Machines Antivirus Downloads Licensing Sports Mouse Entertainment iPhone Administration Vulnerabilities Telephone System Robot Customer Relationship Management Cost Management Images 101 Supply Chain Mobility Settings Multi-Factor Authentication IT Management Printing Hacking Wireless Content Filtering VPN Meetings Presentation YouTube User Tip Modem Wireless Technology Cryptocurrency Computer Repair Processor Employees Mobile Security Integration Virtual Desktop Word Data storage Smart Technology LiFi Data Privacy Holidays Machine Learning Saving Time Data Storage Outlook Video Conferencing Money Humor Managed Services Provider Managed IT Service Alerts Hacks Twitter Scary Stories Vendors Gig Economy Download Be Proactive Internet Service Provider Error Teamwork Undo Fun Browsers Workforce Regulations Compliance Connectivity Break Fix Deep Learning Social Engineering Evernote Memes Remote Computing Threats Upload Social Network Workplace Strategies Net Neutrality SQL Server Multi-Factor Security Education Meta Financial Data IoT Tablet History Dark Web IT Mobile Computing Alert Application Amazon Smartwatch Trends Customer Resource management Managed IT Procurement Regulations File Sharing Azure Google Calendar Dark Data Search How To Tech IBM Data Analysis Outsource IT Telework Star Wars Cyber security Microsoft Excel Best Practice Media Communitications Staff Notifications Buisness Environment CES Gamification Supply Chain Management Social Networking Legal Travel Legislation IT solutions Term Fileless Malware Techology Small Businesses FinTech Google Maps Business Growth IT Assessment Wearable Technology Displays Content Health IT Flexibility Motherboard Unified Threat Management Value Comparison Competition Cortana Alt Codes Directions Unified Threat Management Outsourcing Organization Assessment Permissions Smart Devices Downtime Digital Security Cameras Workplace Remote Working Memory Specifications Hosted Solution Network Congestion Typing Google Play User Microchip User Error Hiring/Firing Internet Exlporer Data Breach Fraud Paperless Electronic Health Records Videos Username Knowledge Co-managed IT Google Drive Point of Sale Wasting Time Black Friday Security Cameras IP Address Technology Care Database Trend Micro Network Management Business Communications Software as a Service IT Technicians Tech Support 5G Experience Proxy Server Scams Cookies Google Docs Managing Costs Cyber Monday Unified Communications Monitors Hotspot Bitcoin SSID Running Cable Recovery Hybrid Work Tactics eCommerce Human Resources Surveillance Mirgation Google Wallet Websites Virtual Assistant Hard Drives Domains Cables Nanotechnology Virtual Machine Language Windows 8 Electronic Medical Records Medical IT Laptop SharePoint Reviews Addiction Management Google Apps Development Chatbots Drones Transportation Refrigeration Public Speaking Lenovo IT Maintenance Screen Reader Hypervisor Distributed Denial of Service Writing Computing Infrastructure Virtual Reality PowerPoint Lithium-ion battery Halloween Business Intelligence Shopping Service Level Agreement Optimization Entrepreneur Server Management Shortcuts Identity Private Cloud Employer/Employee Relationships Bookmark Superfish Ransmoware PCI DSS Smart Tech Identity Theft Navigation

Blog Archive