Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Productivity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones VoIP AI Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Facebook Information Artificial Intelligence Automation Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Employee/Employer Relationship IT Support Spam Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Blockchain Virtualization Bandwidth Business Technology Windows 10 Data Security Two-factor Authentication Vendor Apps Mobile Office Gmail Networking Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Chrome Budget Apple Tip of the week App Mobile Device Management Computing How To Information Technology BDR WiFi HIPAA Office 365 Applications Access Control Hacker Avoiding Downtime Conferencing Marketing Managed IT Services Risk Management Big Data Office Tips Router Analytics Augmented Reality Healthcare Virtual Private Network Storage Password Computers Health Help Desk Bring Your Own Device Website Retail 2FA Operating System Cooperation The Internet of Things Patch Management Save Money Social Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Physical Security Display Printer Customer Service Paperless Office Monitoring Free Resource Infrastructure Project Management Windows 7 Microsoft 365 Document Management Solutions Going Green Windows 11 Telephone Firewall Scam Excel Cybercrime Data loss YouTube Cryptocurrency Safety Holidays Data Storage Telephone System Cost Management Video Conferencing Robot Virtual Desktop Managed Services Provider Data storage LiFi Professional Services Virtual Machines Outlook Data Privacy IT Management Meetings Money VPN User Tip Customer Relationship Management Humor Modem iPhone Mobile Security Processor Computer Repair Hacking Vulnerabilities Sports Presentation Mouse Smart Technology Images 101 Wireless Technology Administration Saving Time Multi-Factor Authentication Mobility Machine Learning Managed IT Service Word Downloads Settings Maintenance Employees Integration Printing Supply Chain Licensing Antivirus Wireless Content Filtering Entertainment Surveillance Trends Virtual Assistant Workplace Entrepreneur Knowledge Tablet Customer Resource management Virtual Machine Google Drive Hiring/Firing Regulations Google Calendar Medical IT Paperless Microsoft Excel Reviews Alert Data Analysis Star Wars Development Dark Data Gamification Undo Transportation Co-managed IT Staff Managed IT 5G File Sharing Experience How To Hypervisor Google Docs Technology Care Social Networking Unified Communications Legislation PowerPoint Bitcoin Business Communications Running Cable Shopping Notifications Fileless Malware Optimization Travel Content Employer/Employee Relationships Google Wallet Scams Wearable Technology Techology Google Maps PCI DSS Health IT Hybrid Work Motherboard Navigation Comparison Assessment Application Windows 8 Human Resources Permissions Laptop Gig Economy Directions Unified Threat Management Internet Service Provider Teamwork Drones Cables Specifications Unified Threat Management Regulations Compliance IBM Evernote Internet Exlporer Google Apps Fraud Halloween Microchip Memes Net Neutrality Network Congestion Username SQL Server IT Maintenance Black Friday User Error Financial Data History Business Intelligence Database Hacks Shortcuts Scary Stories Smartwatch IT Point of Sale Procurement Competition Azure Ransmoware IT Technicians Fun Cyber Monday Telework Proxy Server Cyber security Vendors Cookies Tech Deep Learning Tactics Be Proactive Hotspot Network Management CES Tech Support Communitications Supply Chain Management Monitors Workforce Mirgation Education FinTech Threats Nanotechnology User Term Addiction Mobile Computing Workplace Strategies Language Websites IT Assessment Flexibility Management Value Meta Chatbots Search Distributed Denial of Service SharePoint Organization Electronic Medical Records IP Address Amazon Screen Reader Best Practice Service Level Agreement Computing Infrastructure Buisness Digital Security Cameras Smart Devices Remote Working Writing Memory Legal Outsource IT Identity IT solutions Lenovo Media Virtual Reality Bookmark Data Breach Environment Smart Tech Recovery Google Play Business Growth Download Hard Drives Alerts Server Management Videos Private Cloud Electronic Health Records Identity Theft Domains Wasting Time Small Businesses Superfish Cortana Alt Codes Break Fix Twitter Browsers Trend Micro Displays Connectivity Security Cameras Software as a Service Upload Refrigeration Downtime Error Social Engineering Social Network Public Speaking Managing Costs Outsourcing Hosted Solution Multi-Factor Security SSID Typing Dark Web Remote Computing Lithium-ion battery eCommerce IoT

Blog Archive