Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Backup Passwords Saving Money Communication Productivity Cybersecurity Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Automation Information Facebook Artificial Intelligence Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Blockchain Business Technology Virtualization Bandwidth Two-factor Authentication Vendor Apps Data Security Mobile Office Mobile Device Management Gmail Tip of the week Chrome Budget Employer-Employee Relationship Networking Apple Managed Services App Voice over Internet Protocol BYOD Computing Information Technology Access Control HIPAA Office 365 WiFi Applications How To BDR Conferencing Hacker Avoiding Downtime Marketing Operating System Virtual Private Network Risk Management Health Router 2FA Analytics Office Tips Retail Big Data Augmented Reality Storage Password Help Desk Managed IT Services Bring Your Own Device Computers Healthcare Website Cooperation Cybercrime Display Free Resource Printer Project Management Windows 7 Firewall Paperless Office Infrastructure Microsoft 365 The Internet of Things Solutions Windows 11 Document Management Social Excel Scam Data loss Monitoring Customer Service Patch Management Save Money Remote Monitoring End of Support Vulnerability Remote Workers Telephone Going Green Vendor Management Physical Security Content Filtering Vulnerabilities Word YouTube Computer Repair Telephone System Images 101 Cryptocurrency Cost Management Mobility Multi-Factor Authentication Virtual Desktop Safety Data storage LiFi Machine Learning Outlook Employees User Tip Modem Integration Supply Chain Money Maintenance Processor Mobile Security Humor Antivirus Holidays Sports Customer Relationship Management Smart Technology Mouse Data Storage Saving Time Video Conferencing Administration Managed Services Provider Hacking Virtual Machines Robot Presentation Professional Services Managed IT Service Data Privacy Wireless Technology Downloads IT Management Licensing Settings iPhone VPN Meetings Printing Entertainment Wireless Hard Drives Tech Vendors Telework Hosted Solution Trends Cyber security Customer Resource management Communitications Domains Regulations Google Calendar Be Proactive CES Typing Point of Sale Data Analysis Supply Chain Management Star Wars Microsoft Excel Workforce Refrigeration Staff Term Threats Google Drive Network Management FinTech Tech Support Gamification Knowledge IT Assessment Monitors Public Speaking Social Networking Legislation Workplace Strategies Fileless Malware Flexibility Lithium-ion battery Value 5G Meta Wearable Technology Amazon Entrepreneur Google Docs Organization Unified Communications Websites Content Experience Health IT Smart Devices Running Cable Motherboard Comparison Digital Security Cameras Bitcoin Google Wallet Directions Remote Working Electronic Medical Records Assessment Memory Permissions Outsource IT SharePoint Undo Google Play Environment Media Data Breach Electronic Health Records Laptop Writing Specifications Lenovo Videos Windows 8 Drones Microchip Virtual Reality Internet Exlporer Wasting Time Fraud Small Businesses Security Cameras Displays Server Management Private Cloud Username Trend Micro Identity Theft Software as a Service Halloween Black Friday Superfish Twitter Database Managing Costs Application Outsourcing IT Technicians SSID Error eCommerce Hacks Proxy Server Surveillance Scary Stories Social Engineering IBM Cookies Virtual Assistant Cyber Monday Workplace Hiring/Firing Remote Computing Tactics Virtual Machine Fun Hotspot Mirgation Medical IT Paperless Reviews Deep Learning Tablet Development Nanotechnology Transportation Co-managed IT Technology Care Education Alert Addiction Hypervisor Language Optimization Dark Data Competition Chatbots PowerPoint Business Communications Managed IT Shopping File Sharing Management Mobile Computing How To Screen Reader Employer/Employee Relationships Distributed Denial of Service Scams Navigation Hybrid Work PCI DSS Notifications Service Level Agreement Search Computing Infrastructure Identity Human Resources Gig Economy Best Practice Travel Google Maps Bookmark Internet Service Provider Buisness Smart Tech Teamwork User Cables Techology Evernote Legal Regulations Compliance IT solutions Download Alerts Memes Google Apps Business Growth Unified Threat Management Browsers Net Neutrality IP Address Connectivity SQL Server Break Fix IT Maintenance Unified Threat Management Business Intelligence Financial Data Upload History Cortana Social Network IT Network Congestion Multi-Factor Security Shortcuts Smartwatch Alt Codes Procurement Downtime IoT Azure Recovery Dark Web Ransmoware User Error

Blog Archive