Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Cybersecurity Communication Managed Service Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Information Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Compliance Managed Service Provider Remote Work Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Conferencing Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications How To BDR 2FA Help Desk Operating System Computers Risk Management Virtual Private Network Healthcare Website Health Analytics Office Tips Augmented Reality Retail Storage Password Router Bring Your Own Device Managed IT Services Big Data Monitoring Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Excel Customer Service Vendor Management Cybercrime Physical Security Remote Workers Display Telephone Printer Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Firewall Document Management Microsoft 365 Solutions The Internet of Things Scam Data loss Social Windows 11 Robot Data Storage Customer Relationship Management Smart Technology Supply Chain Video Conferencing Settings Wireless Managed Services Provider Printing Professional Services Content Filtering Saving Time Virtual Machines Hacking IT Management YouTube Meetings Presentation VPN Managed IT Service Cryptocurrency Wireless Technology Downloads iPhone Computer Repair Licensing Virtual Desktop Data storage Vulnerabilities LiFi Entertainment Data Privacy Word Outlook Images 101 Machine Learning Telephone System Multi-Factor Authentication Money Mobility Humor Cost Management Safety Maintenance Antivirus Sports Employees Mouse Integration Administration User Tip Modem Mobile Security Processor Holidays Travel Mirgation Hypervisor Displays Techology PowerPoint Google Maps Cortana Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Alt Codes Downtime Unified Threat Management Management PCI DSS Chatbots Competition Navigation Unified Threat Management Distributed Denial of Service Workplace Hosted Solution Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Typing Network Congestion Regulations Compliance Identity Evernote Paperless Google Drive User Error Co-managed IT User Knowledge Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Point of Sale 5G Financial Data History Business Communications IP Address Google Docs Break Fix Scams Unified Communications Experience Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Bitcoin Network Management Running Cable Tech Support Monitors Social Network Telework Cyber security Google Wallet Multi-Factor Security Tech Human Resources Dark Web Cables Recovery CES IoT Communitications Trends Supply Chain Management Hard Drives Windows 8 Laptop Websites Customer Resource management FinTech Regulations Domains Drones Google Calendar Term Google Apps SharePoint Microsoft Excel IT Maintenance Electronic Medical Records Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Refrigeration Halloween Writing Organization Social Networking Public Speaking Lenovo Legislation Shortcuts Lithium-ion battery Ransmoware Virtual Reality Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Theft Fun Health IT Motherboard Data Breach Superfish Comparison Google Play Be Proactive Permissions Workforce Deep Learning Twitter Directions Videos Assessment Electronic Health Records Wasting Time Threats Undo Error Education Social Engineering Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Remote Computing Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Mobile Computing Tablet Search eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Application Best Practice Alert Dark Data IT Technicians Virtual Machine Environment Managed IT Media Buisness File Sharing Cyber Monday Medical IT IT solutions How To Proxy Server Reviews Cookies IBM Legal Tactics Development Hotspot Transportation Small Businesses Business Growth Notifications

Blog Archive