Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Compliance Gadgets Covid-19 Cloud Computing Training Managed Service Provider Outsourced IT Remote Work Server IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Managed Services Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Voice over Internet Protocol Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Office 365 Conferencing Managed IT Services How To BDR HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Help Desk Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Big Data Operating System Computers Router Risk Management Virtual Private Network 2FA Website Health Monitoring Remote Workers Firewall Document Management Managed IT Service Telephone Free Resource The Internet of Things Scam Data loss Project Management Windows 7 Social Cooperation Microsoft 365 Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Windows 11 Display Printer Paperless Office Infrastructure Excel Professional Services Virtual Machines Word Smart Technology Outlook Machine Learning Money Saving Time Humor iPhone Safety Maintenance Downloads Vulnerabilities Antivirus Sports Data Privacy Mouse Licensing Images 101 Administration Entertainment Mobility Multi-Factor Authentication Robot Telephone System Cost Management Customer Relationship Management Employees Settings Wireless Integration Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Cryptocurrency Holidays Modem Wireless Technology User Tip Processor Data Storage Computer Repair Mobile Security Supply Chain Virtual Desktop Video Conferencing Data storage LiFi Managed Services Provider Workplace Hard Drives Windows 8 Gig Economy Laptop Websites Mirgation Nanotechnology Internet Service Provider Teamwork Hiring/Firing Domains Drones SharePoint Addiction Regulations Compliance Electronic Medical Records Language Evernote Paperless Co-managed IT Refrigeration Management Halloween Chatbots Memes Screen Reader Net Neutrality Writing Distributed Denial of Service SQL Server Technology Care Public Speaking Lenovo Lithium-ion battery Service Level Agreement Financial Data Virtual Reality Computing Infrastructure History Business Communications Scams Hacks Server Management Smartwatch Entrepreneur Scary Stories Private Cloud Identity IT Identity Theft Smart Tech Procurement Fun Azure Hybrid Work Superfish Bookmark Deep Learning Download Telework Twitter Alerts Cyber security Tech Human Resources Communitications Cables Undo CES Error Education Connectivity Supply Chain Management Social Engineering Break Fix Browsers Term Google Apps Upload FinTech Remote Computing IT Assessment Multi-Factor Security IT Maintenance Mobile Computing Social Network Tablet IoT Flexibility Search Dark Web Value Business Intelligence Shortcuts Application Best Practice Trends Organization Alert Smart Devices Dark Data Google Calendar Ransmoware Managed IT Customer Resource management Digital Security Cameras Buisness File Sharing Regulations IT solutions Star Wars Remote Working How To Microsoft Excel Memory Vendors IBM Legal Data Analysis Google Play Be Proactive Business Growth Gamification Notifications Staff Data Breach Electronic Health Records Legislation Workforce Videos Travel Social Networking Google Maps Cortana Wasting Time Threats Techology Fileless Malware Security Cameras Workplace Strategies Alt Codes Content Wearable Technology Trend Micro Software as a Service Comparison Meta Competition Health IT Downtime Unified Threat Management Motherboard Unified Threat Management Directions Hosted Solution Assessment Permissions Managing Costs Amazon SSID Typing eCommerce Surveillance Network Congestion Specifications Virtual Assistant Outsource IT Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Virtual Machine Environment Media Medical IT Username Reviews Point of Sale Development 5G Black Friday Transportation Small Businesses IP Address Google Docs Unified Communications Database Experience Hypervisor Displays PowerPoint Bitcoin Network Management Shopping Running Cable Tech Support IT Technicians Optimization Cookies Monitors Cyber Monday Employer/Employee Relationships Outsourcing Google Wallet Proxy Server Recovery Tactics PCI DSS Hotspot Navigation

Blog Archive