Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Computer Google Email Workplace Tips Phishing Hosted Solutions Collaboration Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Facebook Automation Miscellaneous Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Apps Data Security Two-factor Authentication Vendor Mobile Office Employer-Employee Relationship Networking BYOD Managed Services Mobile Device Management Chrome Voice over Internet Protocol Budget Gmail WiFi Apple Tip of the week App Computing How To Information Technology Hacker BDR HIPAA Avoiding Downtime Applications Office 365 Marketing Access Control Conferencing Retail Operating System Managed IT Services Computers Risk Management 2FA Router Website Analytics Office Tips Augmented Reality Virtual Private Network Help Desk Healthcare Storage Password Health Bring Your Own Device Big Data Going Green Solutions Cooperation Scam Data loss Cybercrime Customer Service Windows 11 Patch Management Save Money Remote Monitoring Vulnerability Excel End of Support Vendor Management Physical Security Remote Workers Monitoring Firewall Display Printer Paperless Office Infrastructure Free Resource The Internet of Things Project Management Windows 7 Telephone Social Document Management Microsoft 365 Entertainment Maintenance Settings Wireless Antivirus Printing Customer Relationship Management Employees Content Filtering Integration Telephone System YouTube Cost Management Hacking Cryptocurrency Presentation Holidays Wireless Technology Data Storage Robot Virtual Desktop LiFi Supply Chain Data storage Video Conferencing Managed Services Provider User Tip Modem Mobile Security Virtual Machines Processor Professional Services Outlook IT Management Word VPN Meetings Money Humor Smart Technology Computer Repair iPhone Sports Saving Time Mouse Safety Vulnerabilities Data Privacy Administration Managed IT Service Images 101 Machine Learning Downloads Multi-Factor Authentication Mobility Licensing Remote Working Memory Vendors Server Management Social Network Private Cloud IBM Multi-Factor Security Dark Web Cortana Data Breach Superfish Google Play Be Proactive Identity Theft IoT Workforce Trends Twitter Alt Codes Videos Electronic Health Records Wasting Time Threats Customer Resource management Error Regulations Downtime Google Calendar Social Engineering Hosted Solution Microsoft Excel Trend Micro Data Analysis Security Cameras Workplace Strategies Star Wars Meta Gamification Remote Computing Typing Competition Staff Software as a Service Managing Costs Amazon Social Networking Legislation Knowledge eCommerce Fileless Malware SSID Tablet Google Drive Virtual Assistant Outsource IT Content Alert Wearable Technology Surveillance Comparison 5G Virtual Machine Environment Managed IT Health IT Media File Sharing Motherboard Dark Data User Assessment How To Unified Communications Permissions Reviews Experience Directions Medical IT Google Docs Transportation Small Businesses Notifications Bitcoin Running Cable Development Specifications Hypervisor Displays Travel Google Wallet IP Address Internet Exlporer Fraud Shopping Optimization Techology Microchip PowerPoint Google Maps Employer/Employee Relationships Outsourcing Username Windows 8 Laptop Black Friday PCI DSS Navigation Unified Threat Management Drones Recovery Database Hard Drives Gig Economy Unified Threat Management Workplace Teamwork Hiring/Firing Domains IT Technicians Halloween Internet Service Provider Cyber Monday Regulations Compliance Proxy Server Evernote Paperless Cookies Network Congestion Tactics Refrigeration Hotspot Memes User Error Co-managed IT SQL Server Technology Care Hacks Public Speaking Mirgation Scary Stories Net Neutrality Financial Data Fun History Business Communications Point of Sale Lithium-ion battery Nanotechnology Addiction Deep Learning Language Smartwatch Entrepreneur IT Scams Azure Hybrid Work Network Management Management Tech Support Chatbots Procurement Education Distributed Denial of Service Telework Cyber security Tech Human Resources Screen Reader Monitors Service Level Agreement Undo Computing Infrastructure CES Communitications Cables Websites Mobile Computing Identity Supply Chain Management FinTech Search Bookmark Term Google Apps Smart Tech Download Electronic Medical Records Best Practice Alerts IT Assessment SharePoint IT Maintenance Flexibility Value Business Intelligence Buisness Writing IT solutions Application Break Fix Organization Lenovo Browsers Shortcuts Legal Connectivity Ransmoware Upload Virtual Reality Business Growth Digital Security Cameras Smart Devices

Blog Archive