Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Artificial Intelligence Facebook Automation Miscellaneous Information Training Gadgets Covid-19 Cloud Computing Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Bandwidth Virtualization Business Technology Blockchain Wi-Fi Windows 10 Apps Vendor Data Security Mobile Office Two-factor Authentication Gmail Chrome Budget WiFi Managed Services Tip of the week Voice over Internet Protocol Apple Employer-Employee Relationship App Networking Mobile Device Management BYOD Conferencing Access Control HIPAA Hacker How To Applications Computing Avoiding Downtime BDR Information Technology Marketing Office 365 Office Tips Analytics Virtual Private Network Augmented Reality Health Storage Password Big Data Bring Your Own Device Healthcare Retail Computers Router Managed IT Services Operating System Website Risk Management Help Desk 2FA Excel Display Printer Telephone The Internet of Things Paperless Office Infrastructure Cooperation Social Remote Workers Document Management Going Green Customer Service Scam Free Resource Data loss Project Management Windows 7 Cybercrime Microsoft 365 Patch Management Solutions Save Money Remote Monitoring Monitoring Vulnerability End of Support Windows 11 Vendor Management Firewall Physical Security Holidays Outlook Managed IT Service Computer Repair Money Safety Data Storage Downloads Humor Video Conferencing Licensing Managed Services Provider Virtual Machines Professional Services Sports Entertainment Mouse Machine Learning Administration iPhone Data Privacy Telephone System Cost Management Customer Relationship Management Maintenance Antivirus Vulnerabilities Hacking Presentation Settings Images 101 Printing Wireless Mobility Multi-Factor Authentication Content Filtering Wireless Technology User Tip Modem Mobile Security YouTube Processor Cryptocurrency Robot Employees Smart Technology Word Integration Virtual Desktop IT Management Data storage LiFi VPN Meetings Saving Time Supply Chain Entrepreneur Medical IT Outsourcing Identity Reviews Smart Tech Development Halloween Transportation Point of Sale Bookmark Workplace Download Alerts Hypervisor Optimization Network Management PowerPoint Hiring/Firing Tech Support Shopping Undo Connectivity Hacks Break Fix Scary Stories Employer/Employee Relationships Browsers Paperless Monitors Navigation Co-managed IT Upload PCI DSS Fun Multi-Factor Security Technology Care Websites Social Network Gig Economy Deep Learning IoT Dark Web Internet Service Provider Teamwork Business Communications Evernote Scams Electronic Medical Records Trends Regulations Compliance Education Application SharePoint Google Calendar Memes Hybrid Work Customer Resource management Regulations Star Wars Mobile Computing IBM Microsoft Excel Net Neutrality Lenovo SQL Server Data Analysis Human Resources Writing Cables Virtual Reality Gamification Staff Financial Data History Search Legislation IT Server Management Private Cloud Social Networking Smartwatch Best Practice Procurement Buisness Superfish Azure Identity Theft Fileless Malware Google Apps Tech IT Maintenance Twitter Content Legal Wearable Technology Telework IT solutions Cyber security Competition Comparison Communitications Business Intelligence Error Health IT Motherboard CES Business Growth Social Engineering Assessment Permissions Supply Chain Management Directions Shortcuts Term Ransmoware Remote Computing FinTech Cortana Specifications IT Assessment Vendors Alt Codes Internet Exlporer Fraud Flexibility Downtime User Value Tablet Microchip Be Proactive Workforce Alert Username Organization Hosted Solution Typing Black Friday Smart Devices Managed IT Threats File Sharing Dark Data Digital Security Cameras How To Database IP Address Remote Working Memory Workplace Strategies Knowledge Google Play Meta Notifications Google Drive IT Technicians Data Breach Cyber Monday Electronic Health Records Amazon Travel Proxy Server Cookies Videos Tactics Hotspot Recovery Techology Wasting Time 5G Google Maps Experience Security Cameras Outsource IT Google Docs Mirgation Unified Communications Hard Drives Trend Micro Bitcoin Domains Software as a Service Running Cable Environment Unified Threat Management Media Nanotechnology Addiction Google Wallet Language Unified Threat Management Managing Costs eCommerce SSID Small Businesses Management Chatbots Refrigeration Windows 8 Public Speaking Distributed Denial of Service Surveillance Laptop Virtual Assistant Displays Network Congestion Screen Reader Service Level Agreement Drones Lithium-ion battery Computing Infrastructure User Error Virtual Machine

Blog Archive