Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Networking How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Operating System Computers Router Physical Security Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips 2FA Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Big Data Managed IT Services Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Customer Service Vendor Management Cybercrime Solutions Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Remote Workers Telephone The Internet of Things Scam Data loss Vulnerabilities Data Privacy Robot Images 101 Telephone System Customer Relationship Management Cost Management Mobility Multi-Factor Authentication Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Employees Cryptocurrency Wireless Technology User Tip Modem Integration Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Holidays Word Smart Technology Outlook Data Storage Machine Learning Supply Chain Money Saving Time Video Conferencing Humor Managed Services Provider Professional Services Virtual Machines Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse Licensing iPhone Entertainment Administration Telework Application Best Practice Trends Cyber security Alert Tech Human Resources Buisness File Sharing Regulations Cables Dark Data Google Calendar CES Managed IT Customer Resource management Communitications IBM Legal Data Analysis Supply Chain Management IT solutions Star Wars How To Microsoft Excel FinTech Business Growth Gamification Notifications Staff Term Google Apps IT Assessment Travel Social Networking IT Maintenance Legislation Techology Fileless Malware Flexibility Google Maps Value Business Intelligence Cortana Shortcuts Organization Alt Codes Content Wearable Technology Health IT Smart Devices Downtime Unified Threat Management Motherboard Ransmoware Comparison Digital Security Cameras Competition Unified Threat Management Directions Remote Working Hosted Solution Assessment Memory Vendors Permissions Google Play Be Proactive Typing Data Breach Electronic Health Records Workforce Network Congestion Specifications Videos Google Drive User Error Microchip User Internet Exlporer Wasting Time Threats Knowledge Fraud Security Cameras Workplace Strategies Username Trend Micro Software as a Service Point of Sale Meta 5G Black Friday IP Address Google Docs Unified Communications Database Managing Costs Amazon Experience Running Cable Tech Support IT Technicians SSID Bitcoin Network Management eCommerce Google Wallet Proxy Server Surveillance Cookies Virtual Assistant Outsource IT Monitors Cyber Monday Recovery Tactics Virtual Machine Environment Hotspot Media Laptop Websites Mirgation Medical IT Reviews Hard Drives Windows 8 Domains Drones Development Nanotechnology Transportation Small Businesses SharePoint Addiction Hypervisor Displays Electronic Medical Records Language Halloween Chatbots PowerPoint Shopping Refrigeration Management Optimization Public Speaking Lenovo Screen Reader Employer/Employee Relationships Outsourcing Writing Distributed Denial of Service Lithium-ion battery PCI DSS Service Level Agreement Virtual Reality Computing Infrastructure Navigation Entrepreneur Scary Stories Private Cloud Identity Workplace Gig Economy Hacks Server Management Superfish Bookmark Internet Service Provider Identity Theft Smart Tech Teamwork Hiring/Firing Fun Regulations Compliance Deep Learning Download Twitter Alerts Evernote Paperless Error Co-managed IT Undo Memes Browsers Net Neutrality Education Connectivity SQL Server Technology Care Social Engineering Break Fix Financial Data Upload History Remote Computing Business Communications Scams Multi-Factor Security Smartwatch Mobile Computing Social Network IT Procurement Tablet IoT Azure Hybrid Work Search Dark Web

Blog Archive