Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Ransomware Backup Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Data Security Apps Vendor Two-factor Authentication Chrome Tip of the week Budget Managed Services Voice over Internet Protocol Mobile Device Management Apple Gmail Networking App WiFi BYOD Employer-Employee Relationship Avoiding Downtime Marketing Conferencing How To BDR Computing HIPAA Information Technology Applications Hacker Access Control Office 365 Office Tips 2FA Analytics Help Desk Augmented Reality Website Storage Retail Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Router Physical Security Risk Management Virtual Private Network Computers Health Monitoring Excel Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 Going Green The Internet of Things Patch Management Save Money Microsoft 365 Social Remote Monitoring Cybercrime Vulnerability End of Support Vendor Management Solutions Display Customer Service Printer Windows 11 Paperless Office Infrastructure Data Storage Outlook Smart Technology Supply Chain Wireless Technology Video Conferencing Money Machine Learning Managed Services Provider Humor Professional Services Saving Time Virtual Machines Managed IT Service Sports Word Maintenance Mouse Antivirus Downloads iPhone Licensing Administration Vulnerabilities Entertainment Data Privacy Safety Images 101 Settings Telephone System Multi-Factor Authentication Robot Mobility Printing Wireless Cost Management Content Filtering YouTube IT Management Cryptocurrency VPN Employees Meetings Integration Customer Relationship Management User Tip Modem Computer Repair Mobile Security Virtual Desktop Processor Hacking Data storage LiFi Presentation Holidays Websites Mirgation Hypervisor Displays PowerPoint Halloween Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing IP Address SharePoint Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Workplace Hacks Scary Stories Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Recovery Fun Hard Drives Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Deep Learning Co-managed IT Domains Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Education Refrigeration Financial Data Error History Business Communications Social Engineering Break Fix Scams Mobile Computing Public Speaking Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Lithium-ion battery Search Entrepreneur Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Best Practice Dark Web Cables Buisness CES Tablet IoT Communitications Trends Supply Chain Management Alert Legal IT solutions Undo Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Business Growth How To Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Cortana Organization Travel Social Networking Legislation Shortcuts Alt Codes Ransmoware Downtime Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Hosted Solution Application Typing Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce IBM Unified Threat Management Directions Videos Assessment Electronic Health Records Knowledge Wasting Time Threats Google Drive Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip 5G Internet Exlporer Software as a Service Experience Username Managing Costs Amazon Google Docs Unified Communications Bitcoin Competition Running Cable Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Google Wallet Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Windows 8 Laptop Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Drones User

Blog Archive