Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Cybersecurity Saving Money Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management Smartphones AI communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Facebook Automation Information Artificial Intelligence Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Managed Service Provider Remote Work Server Compliance Outsourced IT Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Virtualization Blockchain Business Technology Bandwidth Mobile Office Two-factor Authentication Vendor Apps Data Security Apple Mobile Device Management App BYOD Gmail Managed Services Voice over Internet Protocol Tip of the week Employer-Employee Relationship Chrome Networking Budget Marketing Conferencing Computing Access Control WiFi Information Technology HIPAA Office 365 Applications Hacker How To BDR Avoiding Downtime Website Virtual Private Network Operating System Health Big Data Risk Management 2FA Healthcare Router Retail Office Tips Analytics Augmented Reality Computers Managed IT Services Storage Password Help Desk Bring Your Own Device Solutions Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Telephone Going Green Firewall Physical Security Display Printer Cooperation Cybercrime Paperless Office The Internet of Things Infrastructure Windows 11 Social Remote Workers Document Management Excel Scam Customer Service Free Resource Project Management Data loss Windows 7 Monitoring Microsoft 365 Robot Saving Time Data Privacy Administration Employees Word Integration Managed IT Service IT Management Downloads Meetings VPN Licensing Settings Holidays Printing Entertainment Wireless Safety Computer Repair Data Storage Content Filtering YouTube Video Conferencing Managed Services Provider Virtual Machines Telephone System Professional Services Cryptocurrency Cost Management Machine Learning Virtual Desktop Supply Chain Data storage LiFi iPhone Customer Relationship Management Maintenance Outlook User Tip Vulnerabilities Modem Antivirus Mobile Security Money Processor Humor Hacking Images 101 Presentation Multi-Factor Authentication Mobility Sports Wireless Technology Smart Technology Mouse Travel Mobile Computing Videos Electronic Health Records Screen Reader Distributed Denial of Service Techology Computing Infrastructure Google Apps Google Maps Recovery Search Wasting Time Service Level Agreement Trend Micro Security Cameras Identity IT Maintenance Hard Drives Best Practice Unified Threat Management Buisness Software as a Service Bookmark Smart Tech Business Intelligence Domains Unified Threat Management Alerts Shortcuts Legal IT solutions Managing Costs Download eCommerce SSID Ransmoware Refrigeration Business Growth Network Congestion Surveillance Browsers Virtual Assistant Connectivity Vendors Public Speaking Break Fix User Error Lithium-ion battery Be Proactive Cortana Virtual Machine Upload Reviews Social Network Medical IT Workforce Multi-Factor Security Alt Codes Entrepreneur Point of Sale Downtime Development Transportation IoT Threats Dark Web Hypervisor Trends Workplace Strategies Hosted Solution Shopping Optimization Customer Resource management PowerPoint Regulations Meta Network Management Undo Google Calendar Tech Support Typing Microsoft Excel Monitors Data Analysis Employer/Employee Relationships Star Wars Amazon Gamification Navigation Staff Google Drive PCI DSS Knowledge Gig Economy Social Networking Outsource IT Legislation Websites Media Internet Service Provider Fileless Malware 5G Teamwork Environment Content SharePoint Evernote Wearable Technology Google Docs Application Electronic Medical Records Unified Communications Regulations Compliance Experience Bitcoin Running Cable Memes Health IT Motherboard Small Businesses Comparison IBM Permissions Google Wallet Writing Net Neutrality Directions SQL Server Assessment Displays Lenovo History Virtual Reality Financial Data Windows 8 Smartwatch Laptop IT Outsourcing Server Management Specifications Private Cloud Fraud Identity Theft Drones Procurement Microchip Azure Internet Exlporer Superfish Cyber security Username Tech Workplace Twitter Telework CES Halloween Communitications Hiring/Firing Competition Black Friday Error Paperless Social Engineering Supply Chain Management Database Term IT Technicians Co-managed IT Remote Computing FinTech Hacks Scary Stories IT Assessment Proxy Server Cookies Technology Care Cyber Monday Hotspot Business Communications Tablet User Flexibility Fun Value Tactics Mirgation Scams Alert Deep Learning Organization File Sharing Digital Security Cameras Dark Data Smart Devices Nanotechnology Hybrid Work Managed IT IP Address Language Human Resources How To Education Remote Working Memory Addiction Data Breach Management Google Play Chatbots Cables Notifications

Blog Archive