Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Facebook Automation Information Cloud Computing Miscellaneous Gadgets Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Chrome Networking Gmail Budget Apple BYOD Managed Services Voice over Internet Protocol App Employer-Employee Relationship Tip of the week How To BDR Conferencing WiFi Access Control Computing Hacker HIPAA Information Technology Avoiding Downtime Applications Marketing Office 365 Analytics Office Tips Help Desk Augmented Reality Managed IT Services Storage Password 2FA Bring Your Own Device Big Data Virtual Private Network Healthcare Operating System Health Computers Router Risk Management Website Retail Monitoring Scam Data loss Firewall Windows 11 The Internet of Things Patch Management Save Money Telephone Remote Monitoring End of Support Vulnerability Excel Social Vendor Management Cooperation Physical Security Remote Workers Going Green Display Printer Customer Service Paperless Office Infrastructure Cybercrime Free Resource Project Management Windows 7 Document Management Microsoft 365 Solutions Outlook Employees Integration Smart Technology Money Humor Saving Time Safety Holidays Managed IT Service Sports Robot Data Storage Mouse Downloads Supply Chain Video Conferencing Administration Managed Services Provider Licensing Professional Services Virtual Machines IT Management Entertainment VPN Meetings Customer Relationship Management iPhone Computer Repair Telephone System Settings Cost Management Wireless Printing Content Filtering Vulnerabilities Hacking Presentation Data Privacy YouTube Cryptocurrency Images 101 Wireless Technology Machine Learning Multi-Factor Authentication Mobility User Tip Modem Virtual Desktop Mobile Security Processor Data storage LiFi Maintenance Word Antivirus Social Engineering Trend Micro Mirgation Security Cameras Workplace Strategies Nanotechnology Meta Remote Computing Halloween Software as a Service Refrigeration Public Speaking Addiction Managing Costs Amazon Language Tablet Lithium-ion battery Management eCommerce Chatbots SSID Screen Reader Virtual Assistant Outsource IT Entrepreneur Distributed Denial of Service Alert Hacks Scary Stories Surveillance Dark Data Service Level Agreement Fun Virtual Machine Environment Computing Infrastructure Managed IT Media File Sharing How To Deep Learning Reviews Identity Medical IT Undo Smart Tech Transportation Small Businesses Notifications Bookmark Development Education Download Hypervisor Displays Alerts Travel Google Maps Shopping Optimization Techology PowerPoint Connectivity Employer/Employee Relationships Outsourcing Break Fix Mobile Computing Browsers PCI DSS Upload Search Navigation Unified Threat Management Workplace Multi-Factor Security Best Practice Gig Economy Social Network Application Unified Threat Management Internet Service Provider IoT Teamwork Hiring/Firing Dark Web Buisness Network Congestion IT solutions Regulations Compliance IBM Trends Evernote Paperless Legal Co-managed IT Google Calendar Business Growth Customer Resource management Memes Regulations User Error Net Neutrality Star Wars SQL Server Technology Care Microsoft Excel Data Analysis Financial Data Gamification Cortana History Staff Business Communications Point of Sale Scams Legislation Alt Codes Smartwatch IT Social Networking Procurement Competition Azure Hybrid Work Network Management Tech Support Fileless Malware Downtime Monitors Hosted Solution Telework Content Cyber security Wearable Technology Tech Human Resources Cables Comparison Typing CES Health IT Communitications Motherboard Supply Chain Management Assessment Permissions Websites Directions Google Drive FinTech Knowledge User Term Google Apps IT Maintenance Specifications Electronic Medical Records IT Assessment SharePoint Flexibility Internet Exlporer 5G Value Business Intelligence Fraud Microchip Google Docs Writing Unified Communications Organization IP Address Username Experience Lenovo Shortcuts Ransmoware Black Friday Virtual Reality Bitcoin Digital Security Cameras Running Cable Smart Devices Remote Working Database Memory Vendors Server Management Private Cloud Google Wallet Data Breach Recovery IT Technicians Superfish Google Play Be Proactive Identity Theft Workforce Cyber Monday Twitter Windows 8 Videos Proxy Server Laptop Electronic Health Records Hard Drives Cookies Domains Tactics Wasting Time Threats Hotspot Error Drones

Blog Archive