Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Covid-19 Gadgets Cloud Computing Training Managed Service Provider Outsourced IT Remote Work Server IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Data Security Apps Vendor Managed Services Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Office 365 Conferencing Managed IT Services How To BDR HIPAA Computing Physical Security Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Big Data Operating System 2FA Computers Router Virtual Private Network Risk Management Website Health Healthcare Monitoring Free Resource Firewall Document Management Project Management Windows 7 Managed IT Service Microsoft 365 Telephone The Internet of Things Scam Data loss Solutions Social Cooperation Going Green Patch Management Save Money Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Customer Service Cybercrime Excel Display Printer Remote Workers Paperless Office Infrastructure iPhone Word Smart Technology Outlook Vulnerabilities Machine Learning Data Privacy Money Saving Time Humor Images 101 Multi-Factor Authentication Safety Mobility Maintenance Antivirus Sports Downloads Mouse Licensing Entertainment Administration Employees Integration Telephone System Robot Customer Relationship Management Cost Management Settings Holidays Printing Wireless Content Filtering Data Storage Hacking IT Management Supply Chain Presentation VPN YouTube Meetings Video Conferencing Managed Services Provider Cryptocurrency Virtual Machines Professional Services Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi Scams Hard Drives Windows 8 Laptop Websites Mirgation Smartwatch IT Procurement Azure Hybrid Work Domains Drones Nanotechnology Electronic Medical Records Language Telework Cyber security SharePoint Tech Human Resources Addiction Cables Refrigeration Management Halloween Chatbots CES Communitications Supply Chain Management Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure FinTech Lithium-ion battery Term Google Apps Service Level Agreement IT Maintenance Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity IT Assessment Flexibility Value Business Intelligence Superfish Bookmark Identity Theft Smart Tech Fun Twitter Alerts Organization Shortcuts Deep Learning Download Ransmoware Undo Error Digital Security Cameras Smart Devices Remote Working Memory Vendors Browsers Education Connectivity Social Engineering Break Fix Upload Remote Computing Data Breach Google Play Be Proactive Workforce Mobile Computing Social Network Videos Multi-Factor Security Electronic Health Records Search Dark Web Wasting Time Threats Tablet IoT Application Best Practice Trends Alert Trend Micro Security Cameras Workplace Strategies Meta Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Software as a Service How To Microsoft Excel Managing Costs Amazon IBM Legal Data Analysis IT solutions Star Wars Business Growth Gamification Notifications Staff eCommerce SSID Virtual Assistant Outsource IT Travel Social Networking Legislation Surveillance Cortana Virtual Machine Environment Techology Fileless Malware Media Google Maps Alt Codes Content Wearable Technology Reviews Medical IT Transportation Small Businesses Competition Health IT Downtime Unified Threat Management Motherboard Comparison Development Permissions Hypervisor Displays Unified Threat Management Directions Hosted Solution Assessment Typing Shopping Optimization PowerPoint Employer/Employee Relationships Outsourcing Network Congestion Specifications Knowledge Fraud PCI DSS Google Drive User Error Microchip Navigation User Internet Exlporer Username Gig Economy Workplace Internet Service Provider Teamwork Hiring/Firing Point of Sale 5G Black Friday Experience Regulations Compliance IP Address Google Docs Evernote Paperless Unified Communications Database Co-managed IT Bitcoin Network Management Running Cable Tech Support IT Technicians Memes Net Neutrality SQL Server Technology Care Google Wallet Proxy Server Cookies Monitors Cyber Monday Hotspot Financial Data History Business Communications Recovery Tactics

Blog Archive