Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade Smartphones VoIP AI Business Management Mobile Devices Data Recovery communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Artificial Intelligence Automation Information Facebook Miscellaneous Gadgets Holiday Training Covid-19 Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Blockchain Business Technology Wi-Fi Windows 10 Virtualization Apps Vendor Mobile Office Data Security Two-factor Authentication Chrome Employer-Employee Relationship Budget Managed Services Voice over Internet Protocol Tip of the week Apple App Mobile Device Management Networking Gmail BYOD Access Control HIPAA Hacker Applications Avoiding Downtime Marketing How To Computing BDR Conferencing Information Technology WiFi Office 365 Analytics Office Tips Augmented Reality Virtual Private Network Storage Password Health Bring Your Own Device Router Computers Healthcare Retail Website Help Desk Operating System Managed IT Services 2FA Risk Management Big Data Social Cooperation Physical Security Display Printer Paperless Office Infrastructure Customer Service Remote Workers Document Management Free Resource Going Green Project Management Scam Windows 7 Monitoring Data loss Windows 11 Microsoft 365 Cybercrime Firewall Solutions Excel Patch Management Save Money Telephone The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Outlook Meetings Holidays VPN Data Storage Money Humor Video Conferencing Computer Repair Data Privacy Telephone System Cost Management Managed Services Provider Customer Relationship Management Professional Services Virtual Machines Sports Mouse Hacking Presentation Administration Machine Learning iPhone User Tip Modem Wireless Technology Processor Mobile Security Vulnerabilities Maintenance Antivirus Images 101 Settings Wireless Smart Technology Word Printing Content Filtering Multi-Factor Authentication Mobility YouTube Saving Time Supply Chain Cryptocurrency Managed IT Service Robot Employees Safety Integration Downloads Virtual Desktop Data storage LiFi Licensing Entertainment IT Management Application Network Congestion Scams Reviews Trends Medical IT User Error Regulations Transportation Google Calendar Hybrid Work Halloween Customer Resource management Development Human Resources Data Analysis Star Wars Hypervisor IBM Microsoft Excel Point of Sale Cables Shopping Gamification Optimization Staff PowerPoint Social Networking Employer/Employee Relationships Legislation Hacks Scary Stories Google Apps Fileless Malware PCI DSS Fun Network Management Navigation Tech Support Deep Learning Monitors IT Maintenance Gig Economy Content Wearable Technology Internet Service Provider Motherboard Teamwork Competition Comparison Business Intelligence Health IT Education Shortcuts Directions Regulations Compliance Assessment Permissions Evernote Websites Ransmoware Memes Net Neutrality SharePoint SQL Server Specifications Mobile Computing Electronic Medical Records Vendors Be Proactive Microchip Financial Data Search Internet Exlporer History Fraud User Best Practice Writing Workforce Smartwatch Username IT Lenovo Procurement Azure Black Friday Virtual Reality Threats Buisness IT solutions Workplace Strategies Telework Database Cyber security IP Address Server Management Tech Legal Private Cloud Superfish IT Technicians Identity Theft Business Growth Meta CES Communitications Proxy Server Supply Chain Management Cookies Cyber Monday Twitter Amazon Error FinTech Cortana Tactics Hotspot Term Recovery Mirgation Hard Drives Alt Codes Social Engineering Outsource IT IT Assessment Media Flexibility Nanotechnology Value Domains Remote Computing Environment Downtime Hosted Solution Organization Addiction Language Chatbots Refrigeration Tablet Typing Small Businesses Digital Security Cameras Management Smart Devices Remote Working Screen Reader Memory Public Speaking Distributed Denial of Service Alert Displays Google Drive File Sharing Dark Data Knowledge Service Level Agreement Data Breach Lithium-ion battery Managed IT Computing Infrastructure Google Play Identity Entrepreneur How To Outsourcing Videos Electronic Health Records Bookmark 5G Smart Tech Wasting Time Notifications Google Docs Travel Unified Communications Workplace Experience Download Trend Micro Alerts Security Cameras Techology Undo Google Maps Bitcoin Hiring/Firing Running Cable Software as a Service Paperless Browsers Connectivity Managing Costs Break Fix Google Wallet Unified Threat Management Co-managed IT Upload eCommerce SSID Unified Threat Management Virtual Assistant Multi-Factor Security Windows 8 Technology Care Laptop Social Network Surveillance Business Communications IoT Virtual Machine Dark Web Drones

Blog Archive