Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones VoIP AI communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Facebook Automation Artificial Intelligence Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Virtualization Business Technology Blockchain Bandwidth Two-factor Authentication Apps Vendor Mobile Office Data Security Mobile Device Management Gmail BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Conferencing Computing WiFi Information Technology Access Control Office 365 HIPAA Hacker Applications Avoiding Downtime How To Marketing BDR Operating System Virtual Private Network Risk Management Big Data Health Analytics Office Tips Healthcare Augmented Reality Retail Computers Router Storage Password Bring Your Own Device Managed IT Services 2FA Website Help Desk Going Green Patch Management Save Money Firewall Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Telephone The Internet of Things Display Printer Paperless Office Social Cooperation Infrastructure Remote Workers Document Management Customer Service Free Resource Project Management Windows 7 Scam Data loss Windows 11 Microsoft 365 Solutions Monitoring Excel Robot Employees Integration Settings Saving Time Printing Wireless Content Filtering Managed IT Service IT Management Safety VPN YouTube Holidays Meetings Downloads Cryptocurrency Data Storage Licensing Video Conferencing Computer Repair Data Privacy Entertainment Managed Services Provider Professional Services Virtual Desktop Virtual Machines LiFi Data storage Telephone System Outlook Customer Relationship Management Cost Management Machine Learning iPhone Money Humor Vulnerabilities Hacking Maintenance Presentation Antivirus Sports Mouse Images 101 Modem Wireless Technology User Tip Mobility Processor Mobile Security Multi-Factor Authentication Administration Supply Chain Word Smart Technology Security Cameras Addiction Workplace Language Trend Micro Travel Software as a Service Google Maps Cortana Refrigeration Management Hiring/Firing Chatbots Techology Screen Reader Alt Codes Paperless Distributed Denial of Service Managing Costs Public Speaking SSID Lithium-ion battery Service Level Agreement Co-managed IT Computing Infrastructure Downtime eCommerce Unified Threat Management Hosted Solution Surveillance Virtual Assistant Entrepreneur Technology Care Identity Unified Threat Management Smart Tech Typing Business Communications Virtual Machine Bookmark Medical IT Network Congestion Download Reviews Scams Alerts Development Knowledge Transportation Undo Google Drive Hybrid Work User Error Connectivity Human Resources Break Fix Hypervisor Browsers 5G PowerPoint Upload Shopping Cables Optimization Point of Sale Unified Communications Multi-Factor Security Experience Employer/Employee Relationships Social Network Google Docs IoT Bitcoin PCI DSS Google Apps Dark Web Network Management Running Cable Tech Support Navigation Monitors Application Trends Google Wallet Gig Economy IT Maintenance Regulations Internet Service Provider Google Calendar Teamwork Customer Resource management Business Intelligence Data Analysis Star Wars Windows 8 Regulations Compliance Shortcuts Microsoft Excel Laptop Websites Evernote IBM Gamification Drones Ransmoware Staff Memes Vendors Social Networking SharePoint Net Neutrality Legislation SQL Server Electronic Medical Records Fileless Malware Financial Data Be Proactive Halloween History IT Writing Content Smartwatch Workforce Wearable Technology Lenovo Threats Motherboard Procurement Comparison Azure Virtual Reality Competition Health IT Tech Directions Assessment Hacks Telework Workplace Strategies Permissions Server Management Scary Stories Cyber security Private Cloud Communitications Identity Theft Fun CES Meta Superfish Amazon Deep Learning Supply Chain Management Specifications Twitter Term Microchip User Internet Exlporer FinTech Fraud Error IT Assessment Social Engineering Username Outsource IT Education Environment Flexibility Media Black Friday Value Remote Computing IP Address Database Mobile Computing Organization Smart Devices Tablet Search Digital Security Cameras Small Businesses IT Technicians Displays Cookies Best Practice Remote Working Cyber Monday Memory Alert Proxy Server Google Play Dark Data Recovery Tactics Hotspot Managed IT Buisness Data Breach File Sharing Electronic Health Records How To Hard Drives Legal Videos Outsourcing Mirgation IT solutions Nanotechnology Business Growth Wasting Time Notifications Domains

Blog Archive