Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Facebook Miscellaneous Artificial Intelligence Holiday Automation Gadgets Cloud Computing Training Covid-19 Remote Work Server Compliance Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Virtualization Bandwidth Business Technology Windows 10 Blockchain Vendor Two-factor Authentication Data Security Apps Mobile Office WiFi Networking Employer-Employee Relationship Chrome Managed Services BYOD Budget Voice over Internet Protocol Apple App Mobile Device Management Tip of the week Gmail Computing HIPAA Information Technology Applications How To BDR Office 365 Conferencing Hacker Avoiding Downtime Marketing Access Control Router Risk Management Big Data Managed IT Services Office Tips Analytics Help Desk Augmented Reality Computers Storage Password Healthcare Virtual Private Network Bring Your Own Device 2FA Website Health Operating System Retail Scam The Internet of Things Data loss Social Patch Management Monitoring Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Remote Workers Physical Security Windows 11 Telephone Display Printer Free Resource Paperless Office Project Management Infrastructure Excel Cooperation Windows 7 Going Green Microsoft 365 Document Management Firewall Solutions Cybercrime Employees YouTube Safety Maintenance Integration Antivirus Cryptocurrency Data Privacy User Tip Modem Mobile Security Holidays Processor Virtual Desktop Data storage LiFi Data Storage Robot Outlook Video Conferencing Managed Services Provider Customer Relationship Management Smart Technology Money Virtual Machines Professional Services Humor Saving Time Hacking IT Management VPN Presentation Meetings Sports Managed IT Service Mouse iPhone Wireless Technology Downloads Computer Repair Licensing Administration Vulnerabilities Supply Chain Entertainment Images 101 Word Multi-Factor Authentication Mobility Machine Learning Telephone System Settings Printing Cost Management Wireless Content Filtering Permissions Trend Micro Directions Security Cameras Human Resources Assessment Twitter Cables Knowledge Undo Error Google Drive Software as a Service Managing Costs Social Engineering Specifications Fraud eCommerce Microchip SSID Google Apps Internet Exlporer 5G Remote Computing IT Maintenance Username Experience Google Docs Surveillance Unified Communications Virtual Assistant Bitcoin Virtual Machine Business Intelligence Running Cable Tablet Black Friday Alert Reviews Google Wallet Medical IT Shortcuts Database Application Managed IT Ransmoware File Sharing IT Technicians Dark Data Development Transportation Windows 8 Hypervisor Vendors Proxy Server Laptop IBM Cookies How To Cyber Monday Notifications Hotspot Shopping Drones Optimization PowerPoint Be Proactive Tactics Workforce Travel Mirgation Employer/Employee Relationships Techology Threats Halloween Navigation Google Maps Nanotechnology PCI DSS Language Gig Economy Workplace Strategies Addiction Meta Management Competition Unified Threat Management Chatbots Internet Service Provider Teamwork Regulations Compliance Hacks Unified Threat Management Amazon Scary Stories Evernote Screen Reader Distributed Denial of Service Computing Infrastructure Memes Service Level Agreement Fun SQL Server Outsource IT Identity Network Congestion Net Neutrality Deep Learning Financial Data History User Error Environment Bookmark Media Smart Tech User Alerts Smartwatch IT Education Download Azure Small Businesses Point of Sale Procurement Telework Mobile Computing Cyber security Displays Browsers Tech IP Address Connectivity Break Fix Tech Support CES Communitications Network Management Upload Search Outsourcing Social Network Monitors Multi-Factor Security Supply Chain Management Best Practice FinTech Buisness Term IoT Recovery Dark Web Hard Drives Websites Legal IT Assessment IT solutions Workplace Trends Value Hiring/Firing Customer Resource management Domains Regulations Google Calendar Flexibility Business Growth Organization SharePoint Data Analysis Paperless Star Wars Electronic Medical Records Microsoft Excel Refrigeration Staff Digital Security Cameras Smart Devices Co-managed IT Gamification Cortana Alt Codes Memory Lenovo Technology Care Public Speaking Social Networking Writing Legislation Remote Working Data Breach Fileless Malware Downtime Google Play Lithium-ion battery Business Communications Virtual Reality Content Private Cloud Wearable Technology Entrepreneur Videos Electronic Health Records Hosted Solution Server Management Scams Typing Wasting Time Superfish Hybrid Work Health IT Identity Theft Motherboard Comparison

Blog Archive