Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Facebook Miscellaneous Automation Artificial Intelligence Information Cloud Computing Training Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Windows 10 Wi-Fi Virtualization Business Technology Blockchain Bandwidth Data Security Mobile Office Two-factor Authentication Apps Vendor Apple Networking App Mobile Device Management BYOD Managed Services Gmail Voice over Internet Protocol WiFi Tip of the week Chrome Employer-Employee Relationship Budget Applications Avoiding Downtime How To BDR Marketing Conferencing Computing Information Technology Access Control Office 365 HIPAA Hacker Managed IT Services Website 2FA Help Desk Operating System Physical Security Virtual Private Network Risk Management Healthcare Health Big Data Office Tips Analytics Augmented Reality Retail Storage Password Computers Router Bring Your Own Device Windows 11 Monitoring Going Green Patch Management Save Money Remote Monitoring Vulnerability Excel End of Support Firewall Vendor Management Cybercrime Remote Workers Telephone Display Printer The Internet of Things Paperless Office Infrastructure Cooperation Free Resource Social Project Management Windows 7 Document Management Microsoft 365 Customer Service Solutions Scam Data loss User Tip Modem Administration Wireless Technology Mobile Security Processor Holidays Data Storage Robot Word Smart Technology Supply Chain Settings Video Conferencing Printing Managed Services Provider Wireless Saving Time Virtual Machines Professional Services Content Filtering IT Management VPN YouTube Meetings Managed IT Service Cryptocurrency Safety Downloads Computer Repair iPhone Licensing Virtual Desktop Vulnerabilities Entertainment Data storage LiFi Data Privacy Images 101 Outlook Machine Learning Telephone System Money Multi-Factor Authentication Mobility Humor Cost Management Customer Relationship Management Maintenance Antivirus Sports Hacking Employees Mouse Presentation Integration Username Mobile Computing Managing Costs Amazon eCommerce Tablet Black Friday SSID Search IP Address Virtual Assistant Outsource IT Alert Database Surveillance Best Practice Managed IT IT Technicians Virtual Machine Environment Buisness File Sharing Media Dark Data Proxy Server Reviews Legal Cookies IT solutions Cyber Monday Medical IT How To Hotspot Transportation Small Businesses Notifications Recovery Tactics Development Business Growth Mirgation Hypervisor Displays Travel Hard Drives Shopping Techology Nanotechnology Optimization Google Maps Domains PowerPoint Cortana Language Employer/Employee Relationships Outsourcing Addiction Alt Codes Management PCI DSS Chatbots Downtime Unified Threat Management Refrigeration Navigation Gig Economy Unified Threat Management Screen Reader Hosted Solution Public Speaking Distributed Denial of Service Workplace Lithium-ion battery Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Typing Regulations Compliance Identity Evernote Paperless Network Congestion Entrepreneur Bookmark Google Drive User Error Smart Tech Memes Co-managed IT Knowledge Alerts SQL Server Technology Care Download Net Neutrality Financial Data History Point of Sale Undo Business Communications 5G Experience Browsers Smartwatch Google Docs Connectivity IT Unified Communications Break Fix Scams Upload Procurement Bitcoin Network Management Azure Hybrid Work Running Cable Tech Support Social Network Telework Google Wallet Cyber security Multi-Factor Security Tech Human Resources Monitors Dark Web Cables CES IoT Communitications Trends Supply Chain Management Windows 8 Laptop Websites Application Customer Resource management FinTech Drones Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Electronic Medical Records Data Analysis SharePoint Star Wars IT Assessment IBM Gamification Flexibility Staff Value Business Intelligence Halloween Organization Lenovo Social Networking Legislation Shortcuts Writing Ransmoware Virtual Reality Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Hacks Server Management Wearable Technology Memory Vendors Scary Stories Private Cloud Health IT Superfish Motherboard Data Breach Identity Theft Competition Comparison Google Play Be Proactive Fun Permissions Workforce Twitter Directions Videos Assessment Electronic Health Records Deep Learning Wasting Time Threats Error Trend Micro Education Specifications Security Cameras Workplace Strategies Social Engineering Fraud Meta Remote Computing User Microchip Internet Exlporer Software as a Service

Blog Archive