Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Gadgets Cloud Computing Compliance Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Managed Services Data Security Apps Two-factor Authentication Mobile Office Vendor WiFi Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Budget Gmail Managed IT Services How To BDR Conferencing Computing Physical Security Hacker Information Technology Avoiding Downtime Access Control Office 365 Marketing HIPAA Applications Big Data Healthcare Operating System Computers Risk Management Virtual Private Network Health Website Analytics Office Tips Router Augmented Reality Retail Storage Password 2FA Bring Your Own Device Help Desk The Internet of Things Excel Social Managed IT Service Remote Workers Going Green Patch Management Save Money Telephone Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Customer Service Cooperation Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Document Management Firewall Windows 11 Monitoring Scam Data loss Video Conferencing Administration Managed Services Provider Virtual Machines Professional Services Saving Time Robot Downloads iPhone Settings Customer Relationship Management Wireless Licensing Printing Content Filtering Vulnerabilities IT Management Entertainment YouTube Meetings Data Privacy VPN Hacking Cryptocurrency Presentation Images 101 Mobility Computer Repair Telephone System Multi-Factor Authentication Cost Management Wireless Technology Virtual Desktop Data storage LiFi Outlook Employees Word Integration Machine Learning Money Humor User Tip Modem Processor Mobile Security Holidays Maintenance Antivirus Sports Safety Data Storage Mouse Smart Technology Supply Chain Addiction Language Employer/Employee Relationships Outsourcing Mobile Computing Navigation Tablet Search Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Best Practice Alert Gig Economy Dark Data Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Managed IT Buisness File Sharing Evernote Paperless IT solutions Application How To Regulations Compliance Identity Legal Smart Tech Memes Co-managed IT Business Growth Notifications Bookmark Download Net Neutrality Alerts SQL Server Technology Care IBM Travel Techology Business Communications Google Maps Cortana Financial Data History Connectivity IT Break Fix Scams Alt Codes Browsers Smartwatch Downtime Unified Threat Management Upload Procurement Azure Hybrid Work Unified Threat Management Multi-Factor Security Tech Human Resources Hosted Solution Social Network Telework Cyber security IoT Communitications Dark Web Cables Typing Competition CES Network Congestion Trends Supply Chain Management Google Drive User Error Google Calendar Term Google Apps Knowledge Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Data Analysis Point of Sale User 5G Gamification Flexibility Staff Value Business Intelligence Google Docs Legislation Shortcuts Unified Communications Experience Organization Social Networking Smart Devices Ransmoware Bitcoin Network Management Running Cable Tech Support Fileless Malware Digital Security Cameras IP Address Monitors Content Remote Working Wearable Technology Memory Vendors Google Wallet Comparison Google Play Be Proactive Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Windows 8 Laptop Websites Directions Videos Recovery Wasting Time Threats Drones SharePoint Specifications Security Cameras Workplace Strategies Hard Drives Electronic Medical Records Trend Micro Internet Exlporer Software as a Service Fraud Meta Domains Halloween Microchip Writing Username Managing Costs Amazon Lenovo Black Friday SSID Refrigeration Virtual Reality eCommerce Database Surveillance Virtual Assistant Outsource IT Hacks Server Management Public Speaking Scary Stories Private Cloud Lithium-ion battery Identity Theft Fun IT Technicians Virtual Machine Environment Superfish Media Cookies Cyber Monday Medical IT Deep Learning Twitter Proxy Server Reviews Entrepreneur Tactics Development Hotspot Transportation Small Businesses Error Education Social Engineering Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Undo Remote Computing Shopping

Blog Archive