Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade AI VoIP Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Information Facebook Automation Covid-19 Cloud Computing Miscellaneous Gadgets Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Blockchain Windows 10 Virtualization Wi-Fi Business Technology Mobile Office Vendor Data Security Apps Two-factor Authentication Chrome Budget Mobile Device Management Networking Gmail Apple App BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Avoiding Downtime Marketing HIPAA How To Applications BDR WiFi Computing Conferencing Information Technology Access Control Hacker Office 365 Analytics Office Tips Website Augmented Reality Retail Storage Password Managed IT Services Bring Your Own Device Router Big Data Help Desk Operating System Healthcare Virtual Private Network 2FA Risk Management Health Computers Cooperation Document Management Microsoft 365 Solutions Scam Data loss Firewall The Internet of Things Patch Management Save Money Remote Monitoring Going Green End of Support Vulnerability Social Vendor Management Monitoring Cybercrime Remote Workers Physical Security Windows 11 Display Printer Paperless Office Customer Service Infrastructure Excel Telephone Free Resource Project Management Windows 7 Outlook Multi-Factor Authentication Mobility Money Humor Telephone System Maintenance Cost Management Word Antivirus Data Privacy Employees Sports Integration Mouse Administration Safety Holidays User Tip Modem Data Storage Robot Processor Mobile Security Video Conferencing Managed Services Provider Professional Services Virtual Machines Settings Printing Wireless Smart Technology IT Management Meetings Content Filtering VPN Saving Time YouTube Customer Relationship Management iPhone Computer Repair Cryptocurrency Managed IT Service Supply Chain Hacking Vulnerabilities Downloads Virtual Desktop Presentation Data storage LiFi Licensing Images 101 Machine Learning Entertainment Wireless Technology Lenovo Technology Care Organization Writing IP Address Trends Customer Resource management Halloween Regulations Google Calendar Business Communications Digital Security Cameras Virtual Reality Smart Devices Private Cloud Remote Working Data Analysis Memory Star Wars Microsoft Excel Server Management Scams Staff Superfish Hybrid Work Identity Theft Data Breach Gamification Recovery Google Play Scary Stories Hard Drives Social Networking Legislation Human Resources Videos Twitter Hacks Electronic Health Records Error Fileless Malware Domains Wasting Time Fun Cables Wearable Technology Social Engineering Deep Learning Trend Micro Content Security Cameras Software as a Service Health IT Refrigeration Motherboard Comparison Google Apps Remote Computing Directions Education Public Speaking Managing Costs Assessment Permissions IT Maintenance SSID Business Intelligence Tablet Lithium-ion battery eCommerce Surveillance Virtual Assistant Entrepreneur Specifications Shortcuts Alert Mobile Computing File Sharing Dark Data Microchip Virtual Machine Internet Exlporer Search Fraud Managed IT Ransmoware Medical IT Vendors Reviews How To Best Practice Username Development Buisness Undo Transportation Black Friday Be Proactive Notifications Workforce Travel Legal IT solutions Hypervisor Database PowerPoint IT Technicians Techology Threats Google Maps Shopping Business Growth Optimization Proxy Server Employer/Employee Relationships Cookies Cyber Monday Workplace Strategies Meta Unified Threat Management PCI DSS Tactics Cortana Navigation Hotspot Application Mirgation Unified Threat Management Amazon Gig Economy Alt Codes Internet Service Provider Downtime Teamwork Nanotechnology Outsource IT Regulations Compliance Network Congestion Hosted Solution IBM Addiction Evernote Language Chatbots User Error Environment Media Typing Memes Management Net Neutrality SQL Server Screen Reader Distributed Denial of Service Small Businesses Point of Sale Google Drive Financial Data History Service Level Agreement Knowledge Computing Infrastructure Identity Displays Smartwatch IT Procurement Bookmark Competition Azure Smart Tech 5G Network Management Tech Support Outsourcing Google Docs Telework Monitors Unified Communications Cyber security Download Experience Tech Alerts Running Cable CES Bitcoin Communitications Websites Google Wallet Supply Chain Management Browsers Connectivity Break Fix Workplace Hiring/Firing FinTech Upload User Term Social Network Laptop SharePoint Multi-Factor Security Paperless Electronic Medical Records Windows 8 IT Assessment Drones Flexibility Value IoT Dark Web Co-managed IT

Blog Archive