Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Productivity Passwords Backup Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade AI Business Management Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Facebook Information Automation Artificial Intelligence Covid-19 Cloud Computing Miscellaneous Holiday Training Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Data Management Government Business Continuity Blockchain Wi-Fi Virtualization Business Technology Bandwidth Windows 10 Vendor Two-factor Authentication Apps Mobile Office Data Security Gmail BYOD Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Mobile Device Management App WiFi HIPAA Computing Applications Information Technology Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To BDR Operating System Router Big Data Virtual Private Network Risk Management 2FA Health Help Desk Analytics Office Tips Augmented Reality Computers Retail Healthcare Storage Password Website Bring Your Own Device Managed IT Services Going Green Patch Management Save Money Solutions Remote Monitoring End of Support Vulnerability Vendor Management The Internet of Things Cybercrime Physical Security Social Display Windows 11 Printer Paperless Office Infrastructure Monitoring Excel Customer Service Document Management Remote Workers Telephone Scam Data loss Free Resource Project Management Windows 7 Cooperation Firewall Microsoft 365 Robot Telephone System Cost Management Settings Safety Wireless Printing Content Filtering Employees Integration IT Management VPN YouTube Meetings Cryptocurrency User Tip Modem Computer Repair Mobile Security Holidays Processor Data Storage Virtual Desktop Data storage Supply Chain LiFi Customer Relationship Management Video Conferencing Smart Technology Managed Services Provider Outlook Professional Services Virtual Machines Hacking Machine Learning Presentation Money Saving Time Humor Managed IT Service Wireless Technology iPhone Maintenance Downloads Antivirus Sports Mouse Vulnerabilities Licensing Data Privacy Administration Entertainment Word Images 101 Multi-Factor Authentication Mobility Legislation Remote Working Memory Vendors Entrepreneur Travel Social Networking Google Play Be Proactive Google Maps Cortana Data Breach Techology Fileless Malware Electronic Health Records Workforce Alt Codes Content Wearable Technology Videos Comparison Undo Wasting Time Threats Health IT Downtime Unified Threat Management Motherboard Security Cameras Workplace Strategies Hosted Solution Assessment Permissions Trend Micro Unified Threat Management Directions Software as a Service Meta Typing Network Congestion Specifications Managing Costs Amazon SSID Internet Exlporer Knowledge Fraud eCommerce Google Drive User Error Microchip Surveillance Application Virtual Assistant Outsource IT Username 5G Black Friday Virtual Machine Environment Media Point of Sale Medical IT Unified Communications Database Experience Reviews IBM Google Docs Development Transportation Small Businesses Bitcoin Network Management Running Cable Tech Support IT Technicians Monitors Cyber Monday Hypervisor Displays Google Wallet Proxy Server Cookies PowerPoint Tactics Hotspot Shopping Optimization Employer/Employee Relationships Outsourcing Windows 8 Laptop Websites Mirgation Nanotechnology PCI DSS Competition Drones Navigation SharePoint Workplace Addiction Electronic Medical Records Language Gig Economy Internet Service Provider Teamwork Hiring/Firing Management Halloween Chatbots Screen Reader Writing Distributed Denial of Service Regulations Compliance Lenovo Evernote Paperless User Co-managed IT Service Level Agreement Virtual Reality Computing Infrastructure Memes Net Neutrality SQL Server Technology Care Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun Financial Data History Superfish Bookmark Business Communications Scams Deep Learning Download Twitter Alerts Smartwatch IP Address IT Procurement Azure Hybrid Work Error Education Connectivity Social Engineering Break Fix Telework Cyber security Browsers Tech Human Resources Recovery Cables Upload Remote Computing CES Communitications Multi-Factor Security Supply Chain Management Hard Drives Mobile Computing Social Network Tablet IoT Search Dark Web FinTech Domains Term Google Apps IT Maintenance Best Practice Trends Alert IT Assessment Dark Data Google Calendar Flexibility Refrigeration Value Business Intelligence Managed IT Customer Resource management Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel Organization Public Speaking Legal Data Analysis Shortcuts Smart Devices Ransmoware Business Growth Gamification Notifications Staff Digital Security Cameras Lithium-ion battery

Blog Archive