Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Quick Tips AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Managed Services Apps App BYOD Mobile Device Management Gmail Tip of the week WiFi Chrome Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking BDR Hacker Avoiding Downtime Marketing HIPAA Computing Physical Security Applications Information Technology Access Control Office 365 Conferencing Managed IT Services How To Computers Operating System Website Router Risk Management Virtual Private Network 2FA Health Help Desk Analytics Office Tips Augmented Reality Big Data Retail Storage Healthcare Password Bring Your Own Device Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Windows 11 Display Printer Firewall Paperless Office Excel Infrastructure Monitoring The Internet of Things Document Management Social Managed IT Service Remote Workers Telephone Scam Data loss Customer Service Cooperation Free Resource Project Management Images 101 Presentation Multi-Factor Authentication Robot Mobility Telephone System Cost Management Wireless Technology Settings Wireless Printing Content Filtering IT Management YouTube Meetings VPN Employees Integration Word Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Supply Chain Virtual Desktop Holidays Data storage LiFi Data Storage Safety Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Maintenance Downloads Antivirus Sports iPhone Data Privacy Mouse Customer Relationship Management Licensing Entertainment Administration Vulnerabilities Hacking Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel Vendors Be Proactive Business Growth Gamification Flexibility Notifications Staff Value User Travel Social Networking Legislation Workforce Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Threats Workplace Strategies Alt Codes Content Remote Working IP Address Wearable Technology Memory Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Meta Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Amazon Typing Wasting Time Recovery Trend Micro Hard Drives Network Congestion Specifications Security Cameras Outsource IT Media Google Drive User Error Microchip Internet Exlporer Software as a Service Domains Knowledge Fraud Environment Username Managing Costs Point of Sale eCommerce Refrigeration 5G Black Friday SSID Small Businesses Google Docs Unified Communications Database Surveillance Public Speaking Experience Virtual Assistant Displays Bitcoin Network Management Lithium-ion battery Running Cable Tech Support IT Technicians Virtual Machine Cookies Monitors Cyber Monday Medical IT Entrepreneur Outsourcing Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Workplace Windows 8 Laptop Websites Mirgation Hypervisor Nanotechnology Optimization Undo PowerPoint Hiring/Firing Drones Shopping Paperless SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Navigation Co-managed IT Management PCI DSS Halloween Chatbots Screen Reader Writing Distributed Denial of Service Technology Care Lenovo Gig Economy Business Communications Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Evernote Scams Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Application Identity Theft Smart Tech Memes Fun Hybrid Work Superfish Bookmark Human Resources Deep Learning Download Net Neutrality IBM Twitter Alerts SQL Server Cables Financial Data Error History Education Connectivity IT Social Engineering Break Fix Browsers Smartwatch Google Apps Upload Procurement Remote Computing Azure Multi-Factor Security Tech IT Maintenance Mobile Computing Social Network Telework Cyber security CES Tablet IoT Communitications Competition Search Dark Web Business Intelligence Shortcuts Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Ransmoware Managed IT Customer Resource management FinTech

Blog Archive