Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones VoIP AI Mobile Devices communications Data Recovery Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Automation Facebook Information Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Employee/Employer Relationship Encryption IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Bandwidth Business Technology Wi-Fi Windows 10 Blockchain Vendor Data Security Apps Mobile Office Two-factor Authentication Chrome Budget Employer-Employee Relationship BYOD Apple App Managed Services Voice over Internet Protocol Tip of the week Mobile Device Management Gmail Networking BDR Applications Hacker Conferencing Access Control Avoiding Downtime Marketing Computing Information Technology Office 365 How To WiFi HIPAA Router Augmented Reality Big Data Storage Password Bring Your Own Device Help Desk Virtual Private Network 2FA Computers Health Website Operating System Healthcare Retail Risk Management Managed IT Services Analytics Office Tips Solutions Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Monitoring Physical Security Windows 11 Customer Service Display Printer Paperless Office Going Green Excel Infrastructure Remote Workers Telephone Cybercrime Document Management Cooperation Firewall Free Resource Project Management Scam Windows 7 Data loss Microsoft 365 The Internet of Things Money Humor Employees Robot User Tip Modem Integration Processor Mobile Security Sports Mouse IT Management Customer Relationship Management VPN Holidays Meetings Administration Smart Technology Data Storage Hacking Computer Repair Saving Time Presentation Video Conferencing Managed Services Provider Supply Chain Virtual Machines Professional Services Wireless Technology Managed IT Service Settings Wireless Downloads Printing Content Filtering Machine Learning Licensing iPhone YouTube Entertainment Word Cryptocurrency Vulnerabilities Maintenance Antivirus Images 101 Data Privacy Telephone System Virtual Desktop LiFi Cost Management Data storage Multi-Factor Authentication Mobility Safety Outlook Videos Specifications Electronic Health Records Vendors How To Wasting Time Notifications Microchip Be Proactive Internet Exlporer Fraud Application Trend Micro Travel Hacks Security Cameras Workforce Username Scary Stories Fun Black Friday Techology Software as a Service Google Maps Threats Managing Costs Deep Learning Workplace Strategies Database IBM IT Technicians eCommerce Unified Threat Management SSID Meta Proxy Server Education Cookies Cyber Monday Unified Threat Management Surveillance Virtual Assistant Amazon Virtual Machine Tactics Hotspot Mirgation Reviews Mobile Computing Medical IT Outsource IT Network Congestion Media Nanotechnology Search Competition User Error Development Transportation Environment Hypervisor Best Practice Addiction Language Chatbots Shopping Optimization Point of Sale PowerPoint Small Businesses Management Buisness Displays IT solutions Screen Reader Distributed Denial of Service Legal Employer/Employee Relationships Network Management Tech Support Business Growth Navigation Service Level Agreement Computing Infrastructure User PCI DSS Identity Gig Economy Outsourcing Monitors Bookmark Smart Tech Cortana Internet Service Provider Teamwork Websites Alt Codes Evernote Workplace Download IP Address Alerts Regulations Compliance Memes Hiring/Firing Downtime Electronic Medical Records Browsers Hosted Solution Paperless Connectivity Break Fix SharePoint Net Neutrality SQL Server History Typing Co-managed IT Upload Recovery Financial Data Hard Drives Smartwatch Multi-Factor Security Lenovo IT Technology Care Writing Social Network Virtual Reality Business Communications IoT Knowledge Domains Dark Web Procurement Google Drive Azure Server Management Cyber security Private Cloud Tech Scams Trends Telework Regulations 5G Refrigeration CES Google Calendar Superfish Communitications Identity Theft Hybrid Work Customer Resource management Twitter Data Analysis Unified Communications Human Resources Star Wars Experience Public Speaking Microsoft Excel Supply Chain Management Google Docs FinTech Error Bitcoin Term Cables Gamification Running Cable Lithium-ion battery Staff Social Networking Legislation Entrepreneur IT Assessment Google Wallet Social Engineering Value Remote Computing Fileless Malware Google Apps Flexibility Organization Windows 8 IT Maintenance Content Laptop Wearable Technology Motherboard Undo Digital Security Cameras Comparison Smart Devices Tablet Drones Business Intelligence Health IT Memory Alert Directions Shortcuts Assessment Permissions Remote Working Managed IT Data Breach File Sharing Google Play Ransmoware Dark Data Halloween

Blog Archive