Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Backup Passwords Saving Money Communication Productivity Cybersecurity Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Automation Information Facebook Artificial Intelligence Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Blockchain Business Technology Virtualization Bandwidth Two-factor Authentication Vendor Apps Data Security Mobile Office Mobile Device Management Gmail Tip of the week Chrome Budget Employer-Employee Relationship Networking Apple Managed Services Voice over Internet Protocol App BYOD Computing Access Control Information Technology HIPAA Office 365 WiFi Applications How To BDR Conferencing Hacker Avoiding Downtime Marketing Operating System Virtual Private Network Risk Management Health 2FA Router Analytics Office Tips Big Data Retail Augmented Reality Storage Help Desk Password Managed IT Services Bring Your Own Device Computers Healthcare Website Cooperation Free Resource Project Management Cybercrime Display Printer Windows 7 Paperless Office Firewall Infrastructure Microsoft 365 Windows 11 Solutions Document Management The Internet of Things Excel Social Scam Data loss Monitoring Customer Service Patch Management Remote Workers Save Money Remote Monitoring Telephone End of Support Vulnerability Going Green Vendor Management Physical Security Content Filtering Word Images 101 YouTube Computer Repair Telephone System Multi-Factor Authentication Cryptocurrency Mobility Cost Management Safety Virtual Desktop LiFi Machine Learning Supply Chain Data storage Employees Integration Outlook User Tip Modem Processor Money Maintenance Mobile Security Humor Antivirus Holidays Data Storage Customer Relationship Management Sports Smart Technology Video Conferencing Mouse Managed Services Provider Saving Time Virtual Machines Professional Services Data Privacy Administration Hacking Presentation Robot Managed IT Service Wireless Technology Downloads iPhone Licensing IT Management Meetings Settings VPN Entertainment Printing Vulnerabilities Wireless Hard Drives Workplace Strategies Supply Chain Management Trends Hosted Solution Customer Resource management Typing Point of Sale Domains Regulations Term Google Calendar Meta FinTech Data Analysis IT Assessment Star Wars Microsoft Excel Amazon Tech Support Refrigeration Staff Knowledge Flexibility Google Drive Network Management Gamification Value Public Speaking Social Networking Monitors Legislation Outsource IT Organization Media Digital Security Cameras Fileless Malware Smart Devices Lithium-ion battery Environment 5G Unified Communications Websites Wearable Technology Experience Entrepreneur Remote Working Google Docs Content Memory Health IT Data Breach Bitcoin Motherboard Google Play Running Cable Comparison Small Businesses Videos SharePoint Directions Electronic Health Records Google Wallet Assessment Electronic Medical Records Permissions Displays Undo Wasting Time Lenovo Trend Micro Windows 8 Security Cameras Laptop Writing Specifications Outsourcing Microchip Software as a Service Drones Internet Exlporer Virtual Reality Fraud Private Cloud Workplace Server Management Username Managing Costs Superfish eCommerce Identity Theft SSID Halloween Black Friday Hiring/Firing Paperless Surveillance Database Virtual Assistant Twitter Application Virtual Machine Error IT Technicians Co-managed IT Reviews Proxy Server Hacks IBM Cookies Medical IT Scary Stories Social Engineering Cyber Monday Technology Care Fun Business Communications Development Tactics Transportation Remote Computing Hotspot Hypervisor Deep Learning Mirgation Scams Shopping Optimization Tablet Nanotechnology PowerPoint Hybrid Work Human Resources Addiction Employer/Employee Relationships Education Alert Language Management File Sharing Competition Chatbots Navigation Dark Data Cables PCI DSS Managed IT Gig Economy Mobile Computing Screen Reader How To Distributed Denial of Service Computing Infrastructure Search Google Apps Internet Service Provider Service Level Agreement Teamwork Notifications Best Practice Travel Identity Evernote IT Maintenance Regulations Compliance Techology Bookmark Memes Google Maps Smart Tech Buisness User Business Intelligence Alerts Shortcuts Net Neutrality Legal Download SQL Server IT solutions History Business Growth Unified Threat Management Ransmoware Financial Data Smartwatch Unified Threat Management Browsers IT IP Address Connectivity Break Fix Vendors Cortana Be Proactive Procurement Upload Azure Social Network Cyber security Alt Codes Tech Network Congestion Multi-Factor Security Workforce Telework CES User Error Communitications IoT Downtime Recovery Dark Web Threats

Blog Archive