Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Data Recovery VoIP Business Management Smartphones AI Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Managed IT Services 2FA Big Data Operating System Healthcare Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Windows 11 Cooperation The Internet of Things Excel Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Cybercrime Physical Security Customer Service Display Printer Free Resource Project Management Windows 7 Paperless Office Infrastructure Monitoring Microsoft 365 Solutions Document Management Firewall Telephone Scam Data loss Safety Holidays Entertainment Administration Data Storage Supply Chain Video Conferencing Managed Services Provider Telephone System Professional Services Robot Virtual Machines Cost Management Settings Printing Wireless Content Filtering IT Management Customer Relationship Management VPN iPhone YouTube Meetings Cryptocurrency User Tip Vulnerabilities Modem Hacking Processor Data Privacy Presentation Computer Repair Mobile Security Virtual Desktop Images 101 Data storage LiFi Wireless Technology Multi-Factor Authentication Mobility Smart Technology Outlook Machine Learning Money Saving Time Word Humor Employees Integration Managed IT Service Maintenance Antivirus Sports Downloads Mouse Licensing Mobile Computing Social Network Medical IT Multi-Factor Security Reviews Development Transportation Small Businesses Tablet IoT Undo Search Dark Web Alert Hypervisor Displays Best Practice Trends Managed IT Customer Resource management PowerPoint Buisness File Sharing Regulations Dark Data Google Calendar Shopping Optimization Legal Data Analysis Employer/Employee Relationships Outsourcing IT solutions Star Wars How To Microsoft Excel Notifications Staff PCI DSS Business Growth Gamification Navigation Workplace Travel Social Networking Application Legislation Gig Economy Internet Service Provider Techology Fileless Malware Teamwork Hiring/Firing Google Maps Cortana Wearable Technology Regulations Compliance Alt Codes Content Evernote Paperless IBM Health IT Co-managed IT Downtime Unified Threat Management Motherboard Comparison Memes Net Neutrality Unified Threat Management Directions SQL Server Technology Care Hosted Solution Assessment Permissions Financial Data History Typing Business Communications Scams Network Congestion Specifications Smartwatch IT Procurement Google Drive User Error Microchip Azure Hybrid Work Internet Exlporer Competition Knowledge Fraud Telework Cyber security Username Tech Human Resources Cables Point of Sale 5G Black Friday CES Communitications Supply Chain Management Google Docs Unified Communications Database Experience Running Cable Tech Support IT Technicians User FinTech Bitcoin Network Management Term Google Apps Google Wallet Proxy Server IT Maintenance Cookies Monitors Cyber Monday IT Assessment Flexibility Value Business Intelligence Tactics Hotspot IP Address Laptop Websites Mirgation Organization Windows 8 Shortcuts Smart Devices Drones Ransmoware Nanotechnology Digital Security Cameras Remote Working SharePoint Memory Vendors Addiction Electronic Medical Records Language Google Play Be Proactive Halloween Chatbots Recovery Data Breach Management Electronic Health Records Lenovo Workforce Screen Reader Hard Drives Writing Distributed Denial of Service Videos Wasting Time Threats Service Level Agreement Domains Virtual Reality Computing Infrastructure Hacks Server Management Security Cameras Workplace Strategies Scary Stories Private Cloud Identity Trend Micro Software as a Service Superfish Bookmark Meta Identity Theft Smart Tech Refrigeration Fun Twitter Alerts Managing Costs Amazon Deep Learning Download Public Speaking SSID Lithium-ion battery Error eCommerce Surveillance Browsers Virtual Assistant Outsource IT Education Connectivity Social Engineering Break Fix Entrepreneur Remote Computing Virtual Machine Environment Upload Media

Blog Archive