Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Managed Service Smartphone Android Upgrade Smartphones VoIP AI Business Management communications Mobile Devices Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship Spam IT Support Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Vendor Mobile Office Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Chrome Budget Tip of the week Mobile Device Management Apple Gmail Networking App Computing Information Technology Hacker Office 365 HIPAA Access Control Avoiding Downtime Applications Marketing Conferencing How To WiFi BDR Operating System Risk Management Virtual Private Network Computers Router Analytics Office Tips Health Augmented Reality 2FA Healthcare Website Storage Password Retail Bring Your Own Device Help Desk Managed IT Services Big Data Patch Management Social Save Money Cybercrime Remote Monitoring Cooperation End of Support Vulnerability Vendor Management Physical Security Customer Service Display Printer Paperless Office Windows 11 Infrastructure Remote Workers Excel Document Management Free Resource Monitoring Project Management Windows 7 Firewall Scam Microsoft 365 Data loss The Internet of Things Solutions Going Green Telephone Robot Content Filtering Entertainment YouTube Cryptocurrency Holidays Customer Relationship Management IT Management Meetings Data Storage Telephone System VPN Cost Management Video Conferencing Virtual Desktop Data storage LiFi Managed Services Provider Hacking Professional Services Computer Repair Virtual Machines Presentation Outlook Wireless Technology Money Modem Supply Chain Humor User Tip iPhone Processor Mobile Security Machine Learning Sports Vulnerabilities Word Mouse Smart Technology Maintenance Images 101 Administration Antivirus Multi-Factor Authentication Mobility Saving Time Safety Managed IT Service Data Privacy Downloads Employees Settings Integration Wireless Licensing Printing Travel Shortcuts Multi-Factor Security Hosted Solution Managing Costs Application Social Network Techology IoT Google Maps Ransmoware Dark Web Typing eCommerce SSID IBM Virtual Assistant Trends Vendors Surveillance Regulations Unified Threat Management Be Proactive Google Drive Google Calendar Virtual Machine Knowledge Customer Resource management Data Analysis Unified Threat Management Star Wars Workforce Reviews Microsoft Excel Medical IT Development Transportation 5G Gamification Threats Staff Social Networking Workplace Strategies Google Docs Legislation Network Congestion Unified Communications Hypervisor Experience PowerPoint Fileless Malware User Error Meta Shopping Bitcoin Optimization Running Cable Competition Employer/Employee Relationships Content Amazon Wearable Technology Google Wallet Motherboard Point of Sale PCI DSS Comparison Navigation Health IT Directions Assessment Outsource IT Gig Economy Permissions Windows 8 Laptop Internet Service Provider Teamwork User Network Management Environment Tech Support Media Drones Regulations Compliance Specifications Monitors Evernote Microchip Internet Exlporer Small Businesses Fraud Memes Halloween Net Neutrality IP Address SQL Server Username Displays Websites Financial Data Black Friday History SharePoint Database Outsourcing Smartwatch Electronic Medical Records Hacks IT Scary Stories Procurement Azure Fun Recovery IT Technicians Cookies Workplace Telework Cyber Monday Writing Deep Learning Cyber security Hard Drives Tech Proxy Server Lenovo Domains Tactics Hiring/Firing CES Hotspot Virtual Reality Communitications Paperless Supply Chain Management Education Server Management Mirgation Private Cloud Nanotechnology Identity Theft Co-managed IT FinTech Refrigeration Term Superfish Public Speaking Addiction Technology Care Language Twitter Mobile Computing IT Assessment Business Communications Flexibility Lithium-ion battery Value Search Management Chatbots Error Entrepreneur Screen Reader Scams Organization Distributed Denial of Service Social Engineering Best Practice Buisness Service Level Agreement Hybrid Work Digital Security Cameras Computing Infrastructure Remote Computing Smart Devices Human Resources Legal Remote Working IT solutions Memory Identity Smart Tech Tablet Cables Business Growth Data Breach Undo Google Play Bookmark Download Videos Alerts Alert Electronic Health Records File Sharing Google Apps Dark Data Wasting Time Cortana Managed IT Connectivity IT Maintenance Break Fix How To Alt Codes Trend Micro Security Cameras Browsers Downtime Upload Business Intelligence Notifications Software as a Service

Blog Archive