Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Workplace Tips IT Services Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Automation Artificial Intelligence Miscellaneous Information Training Gadgets Cloud Computing Covid-19 Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Virtualization Bandwidth Blockchain Wi-Fi Two-factor Authentication Apps Data Security Mobile Office Vendor Gmail WiFi Chrome Tip of the week Budget Managed Services Voice over Internet Protocol Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Applications Access Control Office 365 Conferencing How To Hacker BDR Avoiding Downtime Marketing Computing HIPAA Information Technology Virtual Private Network Health Analytics Office Tips Help Desk 2FA Augmented Reality Big Data Storage Password Retail Bring Your Own Device Healthcare Managed IT Services Computers Operating System Website Router Risk Management Physical Security Firewall Display Printer Paperless Office Infrastructure The Internet of Things Windows 11 Monitoring Document Management Social Excel Remote Workers Telephone Scam Data loss Customer Service Cooperation Free Resource Project Management Going Green Windows 7 Patch Management Microsoft 365 Save Money Remote Monitoring Cybercrime End of Support Vulnerability Solutions Vendor Management User Tip Modem Mobile Security Virtual Desktop Processor Computer Repair Data storage LiFi Safety Holidays Data Storage Outlook Smart Technology Video Conferencing Money Machine Learning Supply Chain Humor Managed Services Provider Professional Services Saving Time Virtual Machines Managed IT Service Sports Mouse Maintenance Customer Relationship Management Downloads Antivirus iPhone Licensing Administration Vulnerabilities Entertainment Hacking Presentation Data Privacy Images 101 Wireless Technology Settings Telephone System Robot Multi-Factor Authentication Mobility Printing Wireless Cost Management Content Filtering YouTube Word IT Management VPN Meetings Employees Cryptocurrency Integration Public Speaking Workplace Strategies Username Google Docs Managing Costs Unified Communications Experience Running Cable Lithium-ion battery Point of Sale Meta eCommerce Bitcoin Black Friday SSID Database Surveillance Entrepreneur Google Wallet Virtual Assistant Amazon Tech Support IT Technicians Virtual Machine Network Management Cyber Monday Medical IT Laptop Outsource IT Proxy Server Reviews Monitors Cookies Windows 8 Media Tactics Development Drones Hotspot Transportation Environment Undo Websites Mirgation Hypervisor PowerPoint Halloween Small Businesses Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships SharePoint Displays Electronic Medical Records Management PCI DSS Chatbots Navigation Distributed Denial of Service Lenovo Scary Stories Outsourcing Gig Economy Application Writing Screen Reader Hacks Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Fun Virtual Reality IBM Private Cloud Workplace Regulations Compliance Identity Deep Learning Evernote Server Management Superfish Identity Theft Hiring/Firing Bookmark Smart Tech Memes Paperless Download Net Neutrality Alerts SQL Server Education Twitter Error Co-managed IT Financial Data History Mobile Computing Break Fix Technology Care Browsers Smartwatch Social Engineering Connectivity IT Business Communications Upload Procurement Azure Search Competition Remote Computing Scams Social Network Telework Cyber security Best Practice Multi-Factor Security Tech Dark Web Buisness Tablet Hybrid Work CES IoT Communitications Human Resources Trends Supply Chain Management Legal IT solutions Alert File Sharing Cables Customer Resource management FinTech User Dark Data Regulations Business Growth Google Calendar Term Managed IT Microsoft Excel Data Analysis How To Star Wars IT Assessment Google Apps Gamification Flexibility Staff Value Cortana Notifications IP Address Travel IT Maintenance Organization Social Networking Alt Codes Legislation Techology Downtime Google Maps Business Intelligence Fileless Malware Digital Security Cameras Smart Devices Shortcuts Content Remote Working Wearable Technology Memory Hosted Solution Unified Threat Management Ransmoware Health IT Recovery Motherboard Data Breach Typing Comparison Google Play Permissions Unified Threat Management Vendors Directions Videos Hard Drives Assessment Electronic Health Records Be Proactive Google Drive Wasting Time Knowledge Domains Workforce Network Congestion Trend Micro Specifications Security Cameras Fraud User Error 5G Threats Microchip Refrigeration Internet Exlporer Software as a Service

Blog Archive