Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Facebook Information Automation Artificial Intelligence Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Data Management Government Business Continuity Windows 10 Blockchain Virtualization Wi-Fi Business Technology Bandwidth Data Security Vendor Apps Two-factor Authentication Mobile Office Gmail Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Chrome Tip of the week Budget Mobile Device Management How To WiFi BDR HIPAA Applications Computing Information Technology Hacker Office 365 Access Control Avoiding Downtime Conferencing Marketing Bring Your Own Device Managed IT Services Big Data Router Operating System Risk Management Virtual Private Network Help Desk Computers 2FA Health Analytics Office Tips Website Augmented Reality Healthcare Storage Password Retail Free Resource Cooperation Firewall Project Management Scam Windows 7 Data loss Microsoft 365 The Internet of Things Going Green Solutions Patch Management Social Save Money Remote Monitoring Cybercrime Vulnerability End of Support Vendor Management Physical Security Monitoring Customer Service Display Printer Windows 11 Paperless Office Infrastructure Remote Workers Excel Telephone Document Management Maintenance Mouse Antivirus Images 101 Administration Data Privacy Multi-Factor Authentication Mobility Telephone System Safety Cost Management Settings Employees Robot Printing Wireless Integration Content Filtering Modem User Tip Processor YouTube Mobile Security IT Management Customer Relationship Management Holidays VPN Meetings Cryptocurrency Data Storage Hacking Smart Technology Computer Repair Virtual Desktop Presentation Video Conferencing Managed Services Provider Data storage LiFi Saving Time Virtual Machines Professional Services Wireless Technology Supply Chain Outlook Managed IT Service Money Downloads Humor Machine Learning iPhone Licensing Word Entertainment Sports Vulnerabilities Twitter Education Trends Public Speaking Supply Chain Management Scams FinTech Regulations Hybrid Work Google Calendar Term Error Customer Resource management Lithium-ion battery Mobile Computing Data Analysis Social Engineering Star Wars IT Assessment Microsoft Excel Entrepreneur Human Resources Cables Value Remote Computing Gamification Search Flexibility Staff Organization Social Networking Legislation Best Practice Fileless Malware Buisness Digital Security Cameras Undo Smart Devices Google Apps Tablet IT Maintenance Memory Legal Alert IT solutions Content Remote Working Wearable Technology Motherboard Business Intelligence Data Breach Comparison Managed IT Google Play File Sharing Business Growth Health IT Dark Data Directions How To Videos Assessment Electronic Health Records Permissions Shortcuts Ransmoware Wasting Time Notifications Cortana Application Vendors Trend Micro Specifications Security Cameras Travel Alt Codes Microchip Downtime Internet Exlporer Software as a Service Fraud Techology Be Proactive Google Maps Workforce Managing Costs Hosted Solution Username IBM Threats eCommerce Black Friday SSID Unified Threat Management Typing Database Surveillance Unified Threat Management Workplace Strategies Virtual Assistant Meta Virtual Machine Google Drive Knowledge IT Technicians Reviews Cookies Amazon Cyber Monday Medical IT Proxy Server Network Congestion Tactics Competition 5G Development Hotspot User Error Transportation Outsource IT Hypervisor Google Docs Unified Communications Experience Mirgation Running Cable Shopping Nanotechnology Environment Optimization Media PowerPoint Point of Sale Bitcoin Google Wallet Addiction Language Employer/Employee Relationships User Small Businesses Network Management Navigation Tech Support Management PCI DSS Chatbots Monitors Laptop Gig Economy Screen Reader Displays Distributed Denial of Service Windows 8 Drones Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Identity Outsourcing Evernote Websites IP Address Regulations Compliance Bookmark Halloween Smart Tech Memes Electronic Medical Records Download Net Neutrality Alerts SharePoint Workplace SQL Server Financial Data Recovery Hiring/Firing History Hacks Browsers Writing Scary Stories Smartwatch Connectivity Hard Drives IT Break Fix Lenovo Paperless Azure Virtual Reality Upload Domains Fun Procurement Co-managed IT Telework Technology Care Cyber security Multi-Factor Security Server Management Tech Private Cloud Deep Learning Social Network CES IoT Refrigeration Communitications Dark Web Superfish Business Communications Identity Theft

Blog Archive