Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Passwords Saving Money Quick Tips Managed Service Communication Cybersecurity Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Office 365 Conferencing WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Website Healthcare Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Operating System 2FA Computers Router Virtual Private Network Risk Management Printer Remote Workers Paperless Office Infrastructure Monitoring Free Resource Firewall Document Management Project Management Windows 7 Microsoft 365 Telephone The Internet of Things Scam Data loss Solutions Social Cooperation Going Green Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Excel Physical Security Display Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi iPhone Word Smart Technology Outlook Machine Learning Vulnerabilities Data Privacy Money Saving Time Humor Images 101 Managed IT Service Multi-Factor Authentication Safety Mobility Maintenance Sports Downloads Antivirus Mouse Licensing Entertainment Administration Employees Integration Telephone System Robot Customer Relationship Management Cost Management Settings Holidays Printing Wireless Content Filtering Data Storage Supply Chain Hacking IT Management Presentation VPN YouTube Meetings Video Conferencing Managed Services Provider Virtual Machines Professional Services Cryptocurrency Wireless Technology User Tip Modem Regulations Compliance IP Address Google Docs Evernote Paperless Unified Communications Database Experience Running Cable Tech Support IT Technicians Memes Co-managed IT Bitcoin Network Management SQL Server Technology Care Google Wallet Proxy Server Cookies Monitors Cyber Monday Net Neutrality Financial Data History Business Communications Recovery Tactics Hotspot Laptop Websites Mirgation Smartwatch IT Scams Hard Drives Windows 8 Azure Hybrid Work Domains Drones Nanotechnology Procurement Telework Cyber security SharePoint Tech Human Resources Addiction Electronic Medical Records Language Halloween Chatbots CES Communitications Cables Refrigeration Management Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Supply Chain Management FinTech Lithium-ion battery Term Google Apps Service Level Agreement Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity IT Assessment IT Maintenance Hacks Server Management Value Business Intelligence Superfish Bookmark Identity Theft Smart Tech Fun Flexibility Organization Shortcuts Deep Learning Download Twitter Alerts Error Digital Security Cameras Smart Devices Ransmoware Undo Memory Vendors Browsers Education Connectivity Social Engineering Break Fix Remote Working Data Breach Google Play Be Proactive Upload Remote Computing Mobile Computing Social Network Videos Multi-Factor Security Electronic Health Records Workforce Wasting Time Threats Tablet IoT Search Dark Web Alert Trend Micro Security Cameras Workplace Strategies Application Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Software as a Service Meta Managing Costs Amazon IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Notifications Staff eCommerce SSID Business Growth Gamification Travel Social Networking Legislation Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Techology Fileless Malware Media Google Maps Cortana Wearable Technology Reviews Medical IT Alt Codes Content Competition Health IT Downtime Unified Threat Management Motherboard Comparison Development Transportation Small Businesses Hypervisor Displays Unified Threat Management Directions Hosted Solution Assessment Permissions Shopping Optimization PowerPoint Typing Network Congestion Specifications Employer/Employee Relationships Outsourcing Google Drive User Error Microchip Navigation User Internet Exlporer Knowledge Fraud PCI DSS Gig Economy Workplace Username Point of Sale 5G Black Friday Internet Service Provider Teamwork Hiring/Firing

Blog Archive