Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Productivity Passwords Backup Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade VoIP Smartphones AI Business Management Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Information Facebook Cloud Computing Gadgets Holiday Training Covid-19 Miscellaneous Server Managed Service Provider Remote Work Compliance Outsourced IT Employee/Employer Relationship Spam Encryption IT Support Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Apps Mobile Office Two-factor Authentication Vendor Data Security BYOD Employer-Employee Relationship App Managed Services Voice over Internet Protocol Tip of the week Mobile Device Management Chrome Gmail Networking Budget Apple Conferencing Access Control Hacker Computing Avoiding Downtime Information Technology Marketing Office 365 HIPAA How To Applications BDR WiFi Help Desk Virtual Private Network Operating System Computers Health Risk Management Healthcare Website Retail 2FA Analytics Office Tips Augmented Reality Managed IT Services Router Storage Password Big Data Bring Your Own Device Vendor Management Monitoring Physical Security Going Green Display Printer Customer Service Paperless Office Infrastructure Cybercrime Telephone Remote Workers Cooperation Document Management Windows 11 Free Resource Project Management Windows 7 Firewall Scam Data loss Excel Microsoft 365 Solutions The Internet of Things Patch Management Save Money Social Remote Monitoring End of Support Vulnerability Data Privacy IT Management Smart Technology Meetings Holidays VPN Customer Relationship Management Saving Time Data Storage Video Conferencing Computer Repair Settings Wireless Managed Services Provider Managed IT Service Hacking Printing Professional Services Presentation Content Filtering Virtual Machines Downloads YouTube Wireless Technology Licensing Cryptocurrency Entertainment Machine Learning iPhone Virtual Desktop Vulnerabilities Data storage Word LiFi Telephone System Maintenance Supply Chain Cost Management Antivirus Outlook Images 101 Money Multi-Factor Authentication Mobility Humor Safety Sports User Tip Modem Mouse Robot Processor Employees Mobile Security Integration Administration Unified Threat Management Mirgation Virtual Assistant IBM Best Practice Surveillance Buisness Nanotechnology Virtual Machine Google Apps Legal IT Maintenance Network Congestion IT solutions Reviews Addiction Language Medical IT Development User Error Chatbots Transportation Business Intelligence Business Growth Management Screen Reader Hypervisor Distributed Denial of Service Shortcuts PowerPoint Point of Sale Competition Ransmoware Shopping Cortana Service Level Agreement Optimization Computing Infrastructure Identity Employer/Employee Relationships Vendors Alt Codes Downtime Bookmark PCI DSS Smart Tech Network Management Navigation Tech Support Be Proactive Workforce Monitors Hosted Solution Gig Economy Download Alerts Internet Service Provider Teamwork Threats User Typing Workplace Strategies Browsers Regulations Compliance Connectivity Break Fix Evernote Websites Google Drive Meta Knowledge Upload Memes Social Network Net Neutrality SharePoint SQL Server IP Address Multi-Factor Security Amazon Electronic Medical Records Financial Data 5G IoT History Dark Web Google Docs Outsource IT Writing Unified Communications Smartwatch Experience Trends IT Lenovo Running Cable Customer Resource management Procurement Regulations Azure Google Calendar Environment Virtual Reality Recovery Bitcoin Media Google Wallet Data Analysis Telework Star Wars Cyber security Server Management Microsoft Excel Tech Private Cloud Hard Drives Staff Identity Theft Domains Small Businesses CES Gamification Communitications Superfish Laptop Supply Chain Management Social Networking Legislation Displays Twitter Windows 8 Drones Fileless Malware FinTech Term Error Refrigeration Wearable Technology Public Speaking Outsourcing Social Engineering Content IT Assessment Halloween Health IT Flexibility Motherboard Value Lithium-ion battery Comparison Remote Computing Workplace Entrepreneur Directions Organization Assessment Permissions Tablet Hiring/Firing Digital Security Cameras Smart Devices Scary Stories Remote Working Memory Specifications Alert Hacks Paperless Undo Co-managed IT Dark Data Microchip Fun Internet Exlporer Data Breach Managed IT Fraud Google Play File Sharing Technology Care How To Deep Learning Videos Username Electronic Health Records Wasting Time Black Friday Notifications Business Communications Scams Education Database Trend Micro Security Cameras Travel Techology IT Technicians Google Maps Hybrid Work Software as a Service Proxy Server Cookies Managing Costs Cyber Monday Application Mobile Computing Human Resources Unified Threat Management Cables Search Tactics eCommerce Hotspot SSID

Blog Archive