Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Passwords Backup Quick Tips Saving Money Cybersecurity Communication Managed Service Smartphone Data Backup Android Upgrade VoIP Business Management AI Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Artificial Intelligence Automation Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption IT Support Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Virtualization Business Technology Blockchain Bandwidth Data Security Mobile Office Two-factor Authentication Apps Vendor Apple Networking App Managed Services Mobile Device Management Voice over Internet Protocol BYOD Gmail Chrome Budget Tip of the week Employer-Employee Relationship Applications Hacker How To Avoiding Downtime BDR Marketing Conferencing Computing Information Technology WiFi Office 365 Access Control HIPAA Computers Managed IT Services 2FA Help Desk Website Operating System Risk Management Healthcare Virtual Private Network Analytics Office Tips Big Data Health Augmented Reality Storage Password Router Bring Your Own Device Retail Customer Service Scam Data loss Windows 11 Going Green Monitoring Excel Patch Management Save Money Cybercrime Remote Monitoring Vulnerability Remote Workers End of Support Firewall Vendor Management Telephone Physical Security Display Cooperation Free Resource Printer The Internet of Things Project Management Paperless Office Windows 7 Infrastructure Social Microsoft 365 Document Management Solutions Maintenance Hacking User Tip Administration Modem Antivirus Presentation Processor Mobile Security Holidays Wireless Technology Data Storage Smart Technology Supply Chain Video Conferencing Settings Managed Services Provider Wireless Printing Saving Time Virtual Machines Robot Content Filtering Professional Services Word YouTube Managed IT Service Cryptocurrency Downloads IT Management VPN Meetings iPhone Licensing Virtual Desktop Safety Data storage Entertainment LiFi Vulnerabilities Data Privacy Computer Repair Outlook Images 101 Money Telephone System Multi-Factor Authentication Mobility Humor Cost Management Machine Learning Sports Customer Relationship Management Mouse Employees Integration Managing Costs Amazon Mobile Computing Username Twitter Error eCommerce Search Black Friday SSID Best Practice Database Surveillance Social Engineering Virtual Assistant Outsource IT Buisness IT Technicians Virtual Machine Environment Media User Remote Computing Legal Proxy Server Reviews IT solutions Cookies Cyber Monday Medical IT Tablet Business Growth Tactics Development Hotspot Transportation Small Businesses Alert Mirgation Hypervisor Displays IP Address Managed IT Shopping File Sharing Nanotechnology Optimization Dark Data Cortana PowerPoint Alt Codes Addiction How To Language Employer/Employee Relationships Outsourcing Management PCI DSS Notifications Downtime Chatbots Navigation Recovery Hard Drives Gig Economy Travel Hosted Solution Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Techology Domains Google Maps Typing Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Refrigeration Google Drive Bookmark Unified Threat Management Smart Tech Memes Knowledge Co-managed IT Alerts SQL Server Technology Care Unified Threat Management Public Speaking Download Net Neutrality Financial Data History 5G Business Communications Lithium-ion battery Google Docs Browsers Smartwatch Entrepreneur Unified Communications Connectivity IT Network Congestion Experience Break Fix Scams Azure Hybrid Work User Error Bitcoin Upload Procurement Running Cable Google Wallet Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Undo CES Point of Sale IoT Communitications Dark Web Cables Laptop Windows 8 Trends Supply Chain Management Drones Customer Resource management FinTech Tech Support Regulations Google Calendar Term Google Apps Network Management Data Analysis Star Wars IT Assessment Monitors Microsoft Excel IT Maintenance Halloween Staff Value Business Intelligence Gamification Flexibility Application Organization Websites Social Networking Legislation Shortcuts Fileless Malware Digital Security Cameras Smart Devices Ransmoware Scary Stories Wearable Technology Memory Vendors SharePoint IBM Hacks Content Remote Working Electronic Medical Records Health IT Motherboard Data Breach Fun Comparison Google Play Be Proactive Lenovo Directions Videos Deep Learning Assessment Electronic Health Records Writing Permissions Workforce Wasting Time Threats Virtual Reality Private Cloud Education Trend Micro Specifications Security Cameras Workplace Strategies Server Management Superfish Competition Microchip Identity Theft Internet Exlporer Software as a Service Fraud Meta

Blog Archive