Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Small Business Ransomware Mobile Device Backup Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Facebook Holiday Miscellaneous Artificial Intelligence Automation Covid-19 Cloud Computing Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Mobile Office Data Security Vendor Two-factor Authentication Apps Apple App Networking Mobile Device Management Gmail BYOD WiFi Employer-Employee Relationship Managed Services Chrome Voice over Internet Protocol Tip of the week Budget Hacker Avoiding Downtime Marketing How To BDR HIPAA Computing Applications Information Technology Office 365 Access Control Conferencing Computers Retail Bring Your Own Device Website Managed IT Services Operating System Router Risk Management Big Data Virtual Private Network Help Desk 2FA Analytics Office Tips Health Augmented Reality Healthcare Storage Password Cooperation Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 Going Green Solutions Patch Management Firewall Save Money Cybercrime Remote Monitoring Vulnerability End of Support Vendor Management The Internet of Things Physical Security Windows 11 Monitoring Display Social Printer Paperless Office Excel Infrastructure Remote Workers Telephone Customer Service Document Management Presentation Mouse Vulnerabilities Entertainment Maintenance Wireless Technology Antivirus Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Word Settings Printing Wireless Content Filtering Employees Robot Integration YouTube User Tip Modem Cryptocurrency Mobile Security Safety Processor IT Management VPN Meetings Holidays Data Storage Virtual Desktop LiFi Smart Technology Data storage Video Conferencing Computer Repair Supply Chain Managed Services Provider Professional Services Saving Time Outlook Virtual Machines Money Managed IT Service Customer Relationship Management Humor Machine Learning Downloads iPhone Licensing Sports Hacking Scams Server Management Social Network Telework Private Cloud Cyber security Education Multi-Factor Security Tech Dark Web Hybrid Work Superfish CES User Identity Theft IoT Communitications Human Resources Trends Supply Chain Management Twitter Mobile Computing Search Cables Customer Resource management FinTech Error Regulations Google Calendar Term Social Engineering Best Practice Microsoft Excel IP Address Data Analysis Star Wars IT Assessment Google Apps Gamification Flexibility Remote Computing Staff Value Buisness IT Maintenance Organization Legal Social Networking IT solutions Legislation Smart Devices Business Growth Business Intelligence Fileless Malware Digital Security Cameras Recovery Tablet Shortcuts Hard Drives Content Remote Working Alert Wearable Technology Memory Comparison Google Play Cortana Ransmoware Domains Managed IT Health IT File Sharing Motherboard Data Breach Dark Data Assessment Electronic Health Records How To Alt Codes Permissions Vendors Directions Videos Be Proactive Refrigeration Notifications Wasting Time Downtime Specifications Security Cameras Workforce Public Speaking Travel Trend Micro Hosted Solution Internet Exlporer Software as a Service Typing Fraud Threats Lithium-ion battery Techology Microchip Google Maps Workplace Strategies Username Entrepreneur Managing Costs Black Friday SSID Knowledge Meta Unified Threat Management Google Drive eCommerce Database Surveillance Virtual Assistant Amazon Unified Threat Management 5G Undo IT Technicians Virtual Machine Unified Communications Cyber Monday Medical IT Experience Outsource IT Proxy Server Reviews Google Docs Cookies Network Congestion Tactics Development Bitcoin Hotspot Transportation Running Cable Environment User Error Media Google Wallet Mirgation Hypervisor PowerPoint Small Businesses Shopping Point of Sale Nanotechnology Optimization Addiction Windows 8 Language Employer/Employee Relationships Laptop Displays Application Network Management Management PCI DSS Tech Support Drones Chatbots Navigation Distributed Denial of Service Outsourcing IBM Gig Economy Screen Reader Monitors Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Halloween Workplace Regulations Compliance Websites Identity Evernote Hiring/Firing Bookmark Smart Tech Memes Download Net Neutrality Electronic Medical Records Hacks Alerts SQL Server Scary Stories SharePoint Paperless Fun Co-managed IT Competition Financial Data History Writing Deep Learning Break Fix Technology Care Lenovo Browsers Smartwatch Connectivity IT Upload Procurement Virtual Reality Azure Business Communications

Blog Archive