Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Managed Service Saving Money Passwords Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Facebook Artificial Intelligence Miscellaneous Information Training Gadgets Covid-19 Cloud Computing Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Apps Data Security Vendor Mobile Device Management Gmail Managed Services Tip of the week Voice over Internet Protocol Chrome WiFi Budget Employer-Employee Relationship Apple Networking App BYOD Computing Marketing Information Technology Access Control Office 365 Conferencing How To BDR HIPAA Hacker Applications Avoiding Downtime Website Risk Management Virtual Private Network 2FA Help Desk Health Analytics Office Tips Augmented Reality Healthcare Big Data Retail Storage Password Bring Your Own Device Managed IT Services Computers Router Operating System Physical Security Windows 11 Display Monitoring Printer Paperless Office Firewall Infrastructure Excel Remote Workers Document Management The Internet of Things Telephone Social Scam Cooperation Free Resource Project Management Data loss Windows 7 Microsoft 365 Customer Service Going Green Patch Management Solutions Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Mobile Security YouTube Meetings Processor VPN Holidays Cryptocurrency Word Data Storage Computer Repair Smart Technology Supply Chain Virtual Desktop Video Conferencing Data storage Managed Services Provider LiFi Saving Time Virtual Machines Professional Services Outlook Safety Managed IT Service Machine Learning Money Humor Downloads iPhone Licensing Maintenance Sports Entertainment Antivirus Vulnerabilities Mouse Data Privacy Images 101 Administration Customer Relationship Management Telephone System Multi-Factor Authentication Mobility Cost Management Hacking Presentation Robot Employees Settings Wireless Technology Wireless Printing Integration Content Filtering User Tip Modem IT Management Virtual Assistant Outsource IT Network Congestion Database Surveillance Google Drive User Error IT Technicians Virtual Machine Environment Media Knowledge Recovery Hard Drives Proxy Server Reviews Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Point of Sale Domains 5G Tactics Development Google Docs Mirgation Hypervisor Displays Unified Communications Experience Refrigeration Shopping Nanotechnology Optimization Bitcoin Network Management PowerPoint Running Cable Tech Support Language Employer/Employee Relationships Outsourcing Public Speaking Monitors Addiction Google Wallet Management PCI DSS Chatbots Navigation Lithium-ion battery Entrepreneur Gig Economy Screen Reader Windows 8 Distributed Denial of Service Workplace Laptop Websites Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Drones Regulations Compliance SharePoint Identity Evernote Paperless Electronic Medical Records Undo Bookmark Smart Tech Memes Co-managed IT Halloween Alerts SQL Server Technology Care Writing Download Net Neutrality Lenovo Financial Data History Business Communications Virtual Reality Browsers Smartwatch Connectivity IT Hacks Server Management Break Fix Scams Scary Stories Private Cloud Superfish Azure Hybrid Work Identity Theft Fun Upload Procurement Social Network Telework Cyber security Deep Learning Multi-Factor Security Tech Human Resources Twitter Application Error CES IoT Communitications Dark Web Cables Education IBM Social Engineering Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Remote Computing Data Analysis Star Wars IT Assessment Mobile Computing Microsoft Excel IT Maintenance Staff Value Business Intelligence Tablet Search Gamification Flexibility Organization Social Networking Best Practice Legislation Shortcuts Alert Buisness File Sharing Competition Dark Data Fileless Malware Digital Security Cameras Smart Devices Managed IT Ransmoware Legal Wearable Technology Memory Vendors IT solutions How To Content Remote Working Health IT Motherboard Data Breach Business Growth Comparison Google Play Be Proactive Notifications Travel Directions Videos Assessment Electronic Health Records Permissions Workforce Techology Wasting Time Threats Google Maps Cortana User Trend Micro Alt Codes Specifications Security Cameras Workplace Strategies Downtime Unified Threat Management Microchip Internet Exlporer Software as a Service Fraud Meta Username Unified Threat Management Managing Costs Amazon Hosted Solution IP Address eCommerce Typing Black Friday SSID

Blog Archive