Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Hosted Solutions Collaboration Workplace Strategy Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Automation Information Artificial Intelligence Covid-19 Training Gadgets Cloud Computing Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Government Data Management Virtualization Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Apps Two-factor Authentication Vendor Mobile Office Data Security WiFi Employer-Employee Relationship Tip of the week Managed Services Chrome Voice over Internet Protocol Budget Networking Mobile Device Management Apple Gmail App BYOD Conferencing Computing Access Control Information Technology Office 365 Hacker HIPAA Avoiding Downtime Applications How To Marketing BDR Virtual Private Network Operating System Big Data Health Risk Management Retail Computers Analytics Office Tips Augmented Reality Router Healthcare Managed IT Services Storage Website Password Bring Your Own Device Help Desk 2FA Going Green Physical Security Excel Solutions The Internet of Things Display Printer Cybercrime Telephone Paperless Office Social Infrastructure Cooperation Document Management Customer Service Scam Remote Workers Data loss Patch Management Free Resource Project Management Save Money Windows 11 Firewall Monitoring Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Microsoft 365 Meetings Safety Saving Time VPN Settings Printing Wireless Managed IT Service Employees Computer Repair Content Filtering Downloads Integration YouTube Licensing Cryptocurrency Entertainment Holidays Customer Relationship Management Machine Learning Data Privacy Virtual Desktop Data Storage Data storage LiFi Telephone System Video Conferencing Managed Services Provider Hacking Cost Management Virtual Machines Maintenance Outlook Professional Services Presentation Antivirus Money Humor Wireless Technology iPhone Sports User Tip Modem Mobile Security Mouse Processor Word Vulnerabilities Robot Administration Images 101 Smart Technology Multi-Factor Authentication Mobility Supply Chain IT Management Network Congestion Outsourcing Screen Reader Remote Working Distributed Denial of Service Memory User Error Computing Infrastructure Data Breach Google Play Undo Cortana Service Level Agreement Workplace Videos Identity Electronic Health Records Alt Codes Wasting Time Point of Sale Hiring/Firing Downtime Bookmark Smart Tech Download Alerts Trend Micro Security Cameras Hosted Solution Paperless Co-managed IT Software as a Service Network Management Tech Support Typing Break Fix Managing Costs Monitors Technology Care Application Browsers Connectivity Upload eCommerce Google Drive SSID Business Communications Knowledge Scams Social Network Surveillance Multi-Factor Security Virtual Assistant Websites IBM Dark Web Virtual Machine Hybrid Work 5G IoT Trends Reviews SharePoint Google Docs Medical IT Electronic Medical Records Unified Communications Human Resources Experience Cables Running Cable Customer Resource management Regulations Development Google Calendar Transportation Bitcoin Microsoft Excel Hypervisor Google Wallet Writing Data Analysis Star Wars Lenovo Gamification Shopping Staff Optimization PowerPoint Virtual Reality Competition Google Apps IT Maintenance Laptop Social Networking Server Management Legislation Employer/Employee Relationships Private Cloud Windows 8 Identity Theft Drones Navigation Business Intelligence Fileless Malware PCI DSS Superfish Content Gig Economy Wearable Technology Twitter Shortcuts Ransmoware Halloween User Health IT Motherboard Internet Service Provider Comparison Teamwork Error Permissions Evernote Social Engineering Vendors Directions Assessment Regulations Compliance Memes Remote Computing Be Proactive Hacks IP Address Workforce Scary Stories Net Neutrality Specifications SQL Server Fraud History Tablet Threats Microchip Fun Internet Exlporer Financial Data Username Smartwatch IT Alert Deep Learning Workplace Strategies Dark Data Meta Recovery Procurement Managed IT Black Friday Azure File Sharing Cyber security Tech How To Amazon Education Hard Drives Database Telework CES IT Technicians Communitications Notifications Domains Travel Mobile Computing Outsource IT Proxy Server Cookies Supply Chain Management Cyber Monday Techology Hotspot Google Maps Term Environment Refrigeration Media Search Tactics FinTech Mirgation IT Assessment Best Practice Public Speaking Unified Threat Management Lithium-ion battery Small Businesses Buisness Nanotechnology Flexibility Value Unified Threat Management Language Legal Displays IT solutions Entrepreneur Addiction Organization Management Digital Security Cameras Chatbots Smart Devices Business Growth

Blog Archive