Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Hosted Solutions Workplace Strategy Collaboration Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Vendor Mobile Office Managed Services Voice over Internet Protocol Apple WiFi App BYOD Employer-Employee Relationship Tip of the week Mobile Device Management Chrome Budget Gmail Networking How To BDR Conferencing Computing Information Technology Hacker Access Control Avoiding Downtime HIPAA Marketing Office 365 Applications Bring Your Own Device Healthcare Big Data Operating System Virtual Private Network 2FA Computers Health Risk Management Website Router Office Tips Analytics Retail Augmented Reality Storage Password Help Desk Managed IT Services Remote Workers The Internet of Things Patch Management Save Money Social Remote Monitoring Telephone End of Support Vulnerability Going Green Vendor Management Free Resource Project Management Windows 7 Physical Security Cooperation Windows 11 Display Microsoft 365 Cybercrime Customer Service Printer Solutions Paperless Office Infrastructure Excel Document Management Firewall Scam Data loss Monitoring Mouse Safety Saving Time Administration Robot iPhone Managed IT Service Vulnerabilities Downloads Licensing IT Management Settings VPN Images 101 Meetings Printing Entertainment Customer Relationship Management Wireless Content Filtering Multi-Factor Authentication Mobility Computer Repair YouTube Hacking Supply Chain Cryptocurrency Telephone System Presentation Cost Management Employees Integration Wireless Technology Virtual Desktop Data storage Machine Learning LiFi Outlook Holidays User Tip Modem Word Maintenance Data Storage Money Processor Mobile Security Antivirus Humor Video Conferencing Data Privacy Managed Services Provider Professional Services Virtual Machines Sports Smart Technology Shortcuts Regulations Compliance Alert Education Addiction Evernote Language Dark Data Undo Chatbots Ransmoware Managed IT File Sharing Memes Management Net Neutrality Mobile Computing How To SQL Server Screen Reader Vendors Distributed Denial of Service Be Proactive Financial Data Notifications History Service Level Agreement Search Computing Infrastructure Best Practice Identity Workforce Smartwatch Travel IT Google Maps Procurement Bookmark Azure Buisness Smart Tech Threats Techology Alerts Workplace Strategies Telework Legal Cyber security IT solutions Download Tech Application Business Growth Meta CES Unified Threat Management Communitications Supply Chain Management Browsers IBM Connectivity Amazon Break Fix Unified Threat Management Cortana FinTech Upload Term Alt Codes Social Network Network Congestion Outsource IT Multi-Factor Security IT Assessment Flexibility Value Downtime IoT Environment Dark Web User Error Media Organization Hosted Solution Trends Typing Customer Resource management Competition Regulations Small Businesses Google Calendar Digital Security Cameras Point of Sale Smart Devices Remote Working Data Analysis Memory Star Wars Displays Microsoft Excel Knowledge Staff Network Management Google Drive Tech Support Data Breach Gamification Google Play Electronic Health Records Monitors Social Networking Outsourcing Legislation Videos Fileless Malware Wasting Time User 5G Security Cameras Experience Wearable Technology Workplace Google Docs Websites Trend Micro Unified Communications Content Software as a Service Bitcoin Health IT Running Cable Motherboard Hiring/Firing Comparison Google Wallet Directions Electronic Medical Records Managing Costs IP Address Assessment Permissions SharePoint Paperless SSID Co-managed IT eCommerce Surveillance Windows 8 Writing Virtual Assistant Laptop Technology Care Specifications Lenovo Business Communications Drones Microchip Virtual Reality Virtual Machine Internet Exlporer Recovery Fraud Medical IT Hard Drives Scams Server Management Reviews Private Cloud Username Development Transportation Domains Halloween Hybrid Work Black Friday Superfish Identity Theft Human Resources Twitter Hypervisor Database PowerPoint Refrigeration IT Technicians Cables Shopping Error Optimization Hacks Proxy Server Social Engineering Employer/Employee Relationships Public Speaking Scary Stories Cookies Cyber Monday Google Apps PCI DSS Remote Computing Lithium-ion battery Tactics Navigation Fun Hotspot Mirgation IT Maintenance Entrepreneur Gig Economy Deep Learning Tablet Internet Service Provider Teamwork Nanotechnology Business Intelligence

Blog Archive