Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone AI Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Covid-19 Gadgets Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Blockchain Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security Apple WiFi BYOD App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Networking Gmail HIPAA Applications Computing Access Control Information Technology Hacker Avoiding Downtime Conferencing Office 365 Marketing How To BDR Big Data Router Physical Security Virtual Private Network Operating System Health 2FA Risk Management Help Desk Computers Retail Analytics Website Office Tips Healthcare Augmented Reality Managed IT Services Storage Password Bring Your Own Device Patch Management Save Money Microsoft 365 Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Solutions Going Green Social Display Printer Cybercrime Windows 11 Paperless Office Infrastructure Monitoring Customer Service Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Firewall Project Management Windows 7 Safety Robot Mobility Telephone System Multi-Factor Authentication Cost Management Administration IT Management Employees VPN Meetings Integration Settings Printing Wireless User Tip Modem Computer Repair Mobile Security Content Filtering Processor Customer Relationship Management YouTube Holidays Data Storage Cryptocurrency Supply Chain Smart Technology Hacking Video Conferencing Presentation Machine Learning Managed Services Provider Virtual Machines Professional Services Virtual Desktop Saving Time Data storage LiFi Wireless Technology Managed IT Service Maintenance Outlook Downloads Antivirus Money iPhone Humor Licensing Word Vulnerabilities Entertainment Data Privacy Sports Mouse Images 101 Shortcuts Legislation Organization Travel Social Networking Mobile Computing Smart Devices Google Maps Ransmoware Undo Search Digital Security Cameras Techology Fileless Malware Remote Working Content Vendors Wearable Technology Memory Best Practice Be Proactive Comparison Google Play Buisness Health IT Unified Threat Management Motherboard Data Breach Electronic Health Records Assessment Legal Workforce Permissions IT solutions Videos Unified Threat Management Directions Threats Wasting Time Business Growth Workplace Strategies Network Congestion Specifications Security Cameras Application Trend Micro Software as a Service Internet Exlporer Meta Fraud Cortana User Error Microchip Username Amazon Managing Costs Alt Codes IBM Black Friday SSID Downtime Point of Sale eCommerce Surveillance Database Outsource IT Virtual Assistant Hosted Solution Network Management Environment Tech Support IT Technicians Virtual Machine Typing Media Monitors Cyber Monday Medical IT Reviews Proxy Server Cookies Development Tactics Google Drive Small Businesses Hotspot Transportation Competition Knowledge Displays Websites Mirgation Hypervisor PowerPoint 5G Shopping Nanotechnology Optimization SharePoint Addiction Google Docs Outsourcing Electronic Medical Records Language Employer/Employee Relationships Unified Communications Experience Running Cable User PCI DSS Management Chatbots Bitcoin Navigation Screen Reader Google Wallet Workplace Writing Distributed Denial of Service Gig Economy Lenovo Internet Service Provider Service Level Agreement Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Paperless Evernote Laptop Regulations Compliance Server Management Private Cloud Identity Windows 8 IP Address Memes Identity Theft Smart Tech Drones Co-managed IT Superfish Bookmark Net Neutrality Download Technology Care Twitter Alerts SQL Server Business Communications Halloween Recovery Financial Data Error History IT Connectivity Scams Social Engineering Break Fix Hard Drives Smartwatch Browsers Procurement Upload Hybrid Work Remote Computing Azure Domains Human Resources Multi-Factor Security Tech Scary Stories Telework Social Network Cyber security Hacks Communitications Tablet IoT Cables Dark Web Refrigeration Fun CES Supply Chain Management Trends Alert Deep Learning Public Speaking Lithium-ion battery Google Apps Dark Data Google Calendar Term FinTech Managed IT Customer Resource management File Sharing Regulations IT Assessment Star Wars IT Maintenance How To Microsoft Excel Education Entrepreneur Data Analysis Flexibility Gamification Business Intelligence Notifications Staff Value

Blog Archive