Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android AI Disaster Recovery Upgrade Data Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Facebook Miscellaneous Information Artificial Intelligence Holiday Training Gadgets Cloud Computing Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Windows 10 Wi-Fi Virtualization Blockchain Bandwidth Mobile Office Data Security Two-factor Authentication Vendor Apps Apple Tip of the week App Managed Services Voice over Internet Protocol Mobile Device Management Gmail Networking WiFi BYOD Chrome Employer-Employee Relationship Budget Access Control Hacker Avoiding Downtime Marketing Conferencing Computing How To Information Technology BDR Office 365 HIPAA Applications Storage Password Computers Health Bring Your Own Device 2FA Help Desk Website Retail Healthcare Operating System Managed IT Services Risk Management Big Data Analytics Office Tips Router Augmented Reality Virtual Private Network Printer Customer Service Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Going Green Remote Workers Telephone Scam Firewall Cybercrime Data loss Cooperation Free Resource Project Management The Internet of Things Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Social Vulnerability End of Support Vendor Management Solutions Physical Security Display Computer Repair Mobile Security Processor Sports Hacking Mouse Presentation Holidays Data Storage Administration Wireless Technology Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Word Managed IT Service Settings Maintenance Printing Antivirus Wireless Downloads Content Filtering iPhone Licensing YouTube Entertainment Vulnerabilities Data Privacy Cryptocurrency Safety Images 101 Telephone System Virtual Desktop Multi-Factor Authentication Robot Mobility Data storage LiFi Cost Management Outlook IT Management Money VPN Employees Meetings Integration Humor Customer Relationship Management User Tip Modem Virtual Assistant Outsource IT Deep Learning Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Education Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development User Websites Mirgation Hypervisor Displays Mobile Computing Shopping Nanotechnology Optimization Search PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Best Practice IP Address Addiction Management PCI DSS Buisness Chatbots Navigation Legal Lenovo Gig Economy IT solutions Screen Reader Writing Distributed Denial of Service Workplace Recovery Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Business Growth Service Level Agreement Internet Service Provider Server Management Regulations Compliance Hard Drives Private Cloud Identity Evernote Paperless Superfish Bookmark Domains Identity Theft Smart Tech Memes Cortana Co-managed IT Twitter Alerts SQL Server Technology Care Alt Codes Download Net Neutrality Financial Data Downtime Refrigeration Error History Business Communications Browsers Smartwatch Hosted Solution Public Speaking Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Typing Lithium-ion battery Upload Procurement Social Network Telework Cyber security Entrepreneur Multi-Factor Security Tech Human Resources Google Drive CES Tablet IoT Communitications Knowledge Dark Web Cables Alert Trends Supply Chain Management Managed IT Customer Resource management FinTech Undo File Sharing Regulations 5G Dark Data Google Calendar Term Google Apps Google Docs Data Analysis Unified Communications Star Wars IT Assessment Experience How To Microsoft Excel IT Maintenance Running Cable Notifications Staff Value Business Intelligence Bitcoin Gamification Flexibility Google Wallet Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Content Remote Working Laptop Application Wearable Technology Memory Vendors Windows 8 Drones Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos IBM Assessment Electronic Health Records Halloween Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip Internet Exlporer Software as a Service Username Scary Stories Managing Costs Amazon Hacks Competition Point of Sale eCommerce Fun Black Friday SSID

Blog Archive