Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Holiday Information Facebook Artificial Intelligence Automation Gadgets Covid-19 Cloud Computing Training Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Wi-Fi Blockchain Windows 10 Virtualization Business Technology Apps Data Security Mobile Office Two-factor Authentication Vendor Managed Services Tip of the week Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking App Mobile Device Management BYOD Gmail WiFi Chrome Conferencing Hacker How To Avoiding Downtime BDR Marketing Computing Information Technology HIPAA Office 365 Applications Access Control Storage Healthcare Help Desk Password Bring Your Own Device Retail Computers Managed IT Services Website Operating System Risk Management Virtual Private Network Router Analytics Office Tips 2FA Health Augmented Reality Big Data Social Remote Workers Monitoring Document Management Free Resource Customer Service Scam Data loss Project Management Windows 7 Telephone Going Green Microsoft 365 Cooperation Patch Management Solutions Save Money Cybercrime Remote Monitoring Vulnerability End of Support Vendor Management Firewall Physical Security Display Printer Windows 11 The Internet of Things Paperless Office Infrastructure Excel Machine Learning Sports Smart Technology iPhone Mouse Customer Relationship Management Maintenance Saving Time Administration Antivirus Vulnerabilities Managed IT Service Hacking Data Privacy Images 101 Presentation Downloads Multi-Factor Authentication Mobility Licensing Wireless Technology Settings Wireless Entertainment Printing Content Filtering Robot Employees YouTube Word Integration Telephone System Cryptocurrency IT Management Cost Management VPN Meetings Holidays Virtual Desktop LiFi Data storage Computer Repair Safety Data Storage Video Conferencing Outlook Managed Services Provider User Tip Modem Supply Chain Mobile Security Virtual Machines Professional Services Processor Money Humor Electronic Medical Records Evernote Proxy Server Hacks Application Cookies SharePoint Scary Stories Workplace Cyber Monday Regulations Compliance Hiring/Firing Hotspot Fun Memes Tactics IBM Deep Learning Mirgation Lenovo Paperless Net Neutrality Writing SQL Server Virtual Reality History Nanotechnology Co-managed IT Financial Data Addiction Education Technology Care Language Server Management Smartwatch Private Cloud IT Management Chatbots Superfish Business Communications Identity Theft Procurement Azure Distributed Denial of Service Telework Twitter Cyber security Tech Mobile Computing Screen Reader Scams Service Level Agreement Hybrid Work Computing Infrastructure Search CES Error Communitications Competition Social Engineering Best Practice Identity Human Resources Supply Chain Management FinTech Remote Computing Term Bookmark Smart Tech Buisness Cables Download IT solutions Alerts IT Assessment Legal Value Business Growth User Google Apps Tablet Flexibility Break Fix Organization Alert Browsers Connectivity IT Maintenance Upload Business Intelligence Managed IT Cortana Digital Security Cameras File Sharing Smart Devices Dark Data How To Memory IP Address Social Network Alt Codes Shortcuts Multi-Factor Security Remote Working Dark Web Notifications Data Breach Google Play IoT Downtime Ransmoware Trends Hosted Solution Vendors Videos Travel Electronic Health Records Wasting Time Customer Resource management Typing Recovery Regulations Techology Be Proactive Google Calendar Google Maps Microsoft Excel Trend Micro Security Cameras Data Analysis Hard Drives Star Wars Workforce Domains Gamification Threats Staff Knowledge Unified Threat Management Software as a Service Google Drive Managing Costs Social Networking Unified Threat Management Workplace Strategies Legislation 5G eCommerce SSID Fileless Malware Refrigeration Meta Public Speaking Content Unified Communications Amazon Wearable Technology Experience Surveillance Network Congestion Virtual Assistant Google Docs Virtual Machine Lithium-ion battery Health IT Bitcoin Motherboard User Error Running Cable Comparison Outsource IT Entrepreneur Permissions Reviews Medical IT Directions Google Wallet Assessment Environment Media Point of Sale Development Transportation Hypervisor Windows 8 Laptop Specifications Small Businesses Fraud Network Management Shopping Tech Support Optimization PowerPoint Microchip Drones Undo Internet Exlporer Username Displays Monitors Employer/Employee Relationships Navigation Halloween Black Friday PCI DSS Outsourcing Gig Economy Websites Database IT Technicians Internet Service Provider Teamwork

Blog Archive