Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Workplace Tips Phishing Email IT Services Hosted Solutions Users Collaboration Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Passwords Communication Data Backup Saving Money Smartphone Backup Android Managed Service Business Management Smartphones VoIP Mobile Devices communications Upgrade Disaster Recovery Social Media Data Recovery Browser Windows Microsoft Office Managed IT Services Network Productivity Remote Tech Term Current Events Internet of Things Automation Artificial Intelligence Facebook Gadgets Cloud Computing AI Holiday Covid-19 Miscellaneous Remote Work Server Managed Service Provider Information Outsourced IT Encryption Spam Training Employee/Employer Relationship Compliance Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology IT Support Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Managed Services Gmail Voice over Internet Protocol Apple Networking BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Tip of the week Marketing Conferencing How To WiFi Big Data Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Healthcare Free Resource Going Green Patch Management Social Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Cybercrime Microsoft 365 Physical Security Customer Service Solutions Display Printer Paperless Office Infrastructure Monitoring Windows 11 2FA Document Management Excel Firewall Telephone Scam Data loss Remote Workers The Internet of Things Cooperation Vulnerabilities Data Privacy Telephone System Robot Cost Management Settings Images 101 Printing Wireless Content Filtering Multi-Factor Authentication Mobility IT Management Customer Relationship Management VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Presentation Computer Repair Mobile Security Employees Processor Integration Virtual Desktop Wireless Technology Data storage LiFi Smart Technology Holidays Outlook Machine Learning Data Storage Money Saving Time Word Supply Chain Humor Video Conferencing Managed IT Service Managed Services Provider Maintenance Virtual Machines Professional Services Antivirus Sports Downloads Mouse Licensing Safety Entertainment Administration iPhone How To Microsoft Excel Telework Cyber security Tech Human Resources Legal Data Analysis IT solutions Star Wars Business Growth Gamification Notifications Staff CES Communitications Cables Travel Social Networking Application Legislation Supply Chain Management Cortana FinTech Term Google Apps Techology Fileless Malware Google Maps Alt Codes Content IBM Wearable Technology IT Assessment IT Maintenance Value Business Intelligence Health IT Downtime Unified Threat Management Motherboard Comparison Flexibility Permissions Organization Shortcuts Unified Threat Management Directions Hosted Solution Assessment Typing Digital Security Cameras Smart Devices Ransmoware Memory Vendors Network Congestion Specifications Remote Working Competition Knowledge Fraud Data Breach Google Play Be Proactive Google Drive User Error Microchip Internet Exlporer Username Videos Electronic Health Records Workforce Wasting Time Threats Point of Sale 5G Black Friday Experience Trend Micro Security Cameras Workplace Strategies Google Docs Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians User Software as a Service Meta Managing Costs Amazon Google Wallet Proxy Server Cookies Monitors Cyber Monday Hotspot eCommerce SSID Tactics Virtual Assistant Outsource IT Windows 8 IP Address Laptop Websites Mirgation Surveillance Virtual Machine Environment Media Drones Nanotechnology Addiction Electronic Medical Records Language Reviews Medical IT SharePoint Transportation Small Businesses Management Halloween Chatbots Recovery Development Writing Distributed Denial of Service Hypervisor Displays Lenovo Screen Reader Hard Drives Service Level Agreement Domains Virtual Reality Computing Infrastructure Shopping Optimization PowerPoint Employer/Employee Relationships Outsourcing Hacks Server Management Scary Stories Private Cloud Identity Fun PCI DSS Navigation Superfish Bookmark Identity Theft Smart Tech Refrigeration Deep Learning Download Public Speaking Twitter Alerts Gig Economy Workplace Teamwork Hiring/Firing Lithium-ion battery Error Internet Service Provider Social Engineering Break Fix Regulations Compliance Entrepreneur Evernote Paperless Browsers Education Connectivity Upload Remote Computing Memes Co-managed IT SQL Server Technology Care Mobile Computing Social Network Multi-Factor Security Net Neutrality Search Dark Web Financial Data History Business Communications Tablet IoT Undo Best Practice Trends Alert Smartwatch IT Scams Azure Hybrid Work Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Procurement

Blog Archive