Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones VoIP Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Information Facebook Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption IT Support Employee/Employer Relationship Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Blockchain Bandwidth Virtualization Mobile Office Two-factor Authentication Vendor Data Security Apps App Managed Services Voice over Internet Protocol Tip of the week Mobile Device Management Gmail Chrome Networking Budget Apple Employer-Employee Relationship BYOD Conferencing Hacker Access Control Computing Avoiding Downtime Marketing Information Technology Office 365 HIPAA How To WiFi BDR Applications Virtual Private Network Computers Healthcare Operating System Health Website Risk Management Retail Analytics Office Tips Augmented Reality 2FA Managed IT Services Router Storage Password Big Data Bring Your Own Device Help Desk Physical Security Going Green Customer Service Remote Workers Display Printer Paperless Office Infrastructure Cybercrime Telephone Free Resource Project Management Document Management Cooperation Windows 7 Microsoft 365 Firewall Windows 11 Solutions Scam Data loss The Internet of Things Excel Social Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Monitoring Virtual Machines Professional Services VPN Meetings Data Privacy Saving Time Hacking Settings Presentation Computer Repair Managed IT Service Printing Wireless Content Filtering iPhone Downloads Wireless Technology YouTube Licensing Vulnerabilities Cryptocurrency Machine Learning Entertainment Images 101 Word Multi-Factor Authentication Mobility Virtual Desktop Data storage LiFi Maintenance Telephone System Cost Management Antivirus Outlook Employees Money Safety Supply Chain Humor Integration Sports User Tip Modem Robot Holidays Mobile Security Mouse Processor Data Storage Administration Video Conferencing Managed Services Provider Smart Technology IT Management Customer Relationship Management Gig Economy Network Congestion Addiction Language Legal IT solutions Human Resources User Error Business Growth Cables Competition Management Internet Service Provider Chatbots Teamwork Screen Reader Distributed Denial of Service Evernote Regulations Compliance Google Apps Point of Sale Cortana Service Level Agreement Memes Computing Infrastructure Alt Codes IT Maintenance Net Neutrality Identity SQL Server Smart Tech History Business Intelligence Network Management Downtime Tech Support Bookmark User Financial Data Shortcuts Smartwatch Monitors Download IT Alerts Hosted Solution Typing Ransmoware Procurement Azure Connectivity Cyber security Break Fix Tech Vendors IP Address Websites Browsers Telework Be Proactive Knowledge CES Upload Communitications Google Drive Multi-Factor Security SharePoint Workforce Electronic Medical Records Social Network Supply Chain Management FinTech IoT Dark Web Term Threats 5G Recovery Workplace Strategies Experience Hard Drives Writing Trends IT Assessment Google Docs Lenovo Unified Communications Value Google Calendar Bitcoin Meta Running Cable Domains Virtual Reality Customer Resource management Flexibility Regulations Organization Star Wars Microsoft Excel Google Wallet Amazon Server Management Private Cloud Data Analysis Identity Theft Refrigeration Digital Security Cameras Gamification Smart Devices Staff Superfish Memory Legislation Windows 8 Outsource IT Laptop Public Speaking Twitter Remote Working Social Networking Data Breach Drones Google Play Environment Lithium-ion battery Media Error Fileless Malware Videos Social Engineering Content Entrepreneur Electronic Health Records Wearable Technology Wasting Time Comparison Small Businesses Halloween Remote Computing Health IT Motherboard Assessment Trend Micro Permissions Security Cameras Displays Directions Tablet Undo Software as a Service Managing Costs Specifications Hacks Outsourcing Scary Stories Alert Fun Dark Data Internet Exlporer eCommerce Fraud SSID Managed IT File Sharing Microchip Deep Learning Workplace How To Username Surveillance Virtual Assistant Virtual Machine Black Friday Hiring/Firing Notifications Application Reviews Database Medical IT Education Paperless Travel Co-managed IT Google Maps Development IT Technicians Transportation Techology Hypervisor Cyber Monday Mobile Computing Technology Care IBM Proxy Server Cookies Search Shopping Tactics Optimization Hotspot PowerPoint Business Communications Unified Threat Management Best Practice Scams Mirgation Employer/Employee Relationships Unified Threat Management Navigation Hybrid Work Buisness PCI DSS Nanotechnology

Blog Archive