Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Automation Facebook Miscellaneous Artificial Intelligence Information Training Gadgets Cloud Computing Covid-19 Managed Service Provider Remote Work Compliance Server Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Government Business Continuity Windows 10 Business Technology Virtualization Wi-Fi Blockchain Bandwidth Apps Two-factor Authentication Data Security Vendor Mobile Office Mobile Device Management Apple Gmail App Tip of the week WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Chrome Budget BYOD Applications Access Control Conferencing Computing Information Technology How To BDR Office 365 Hacker Avoiding Downtime HIPAA Marketing Virtual Private Network Bring Your Own Device Health Help Desk 2FA Operating System Big Data Retail Healthcare Risk Management Managed IT Services Computers Analytics Office Tips Augmented Reality Website Storage Router Password Physical Security Display Printer Paperless Office Firewall Infrastructure Windows 11 Monitoring Going Green The Internet of Things Document Management Excel Cybercrime Remote Workers Social Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Customer Service Patch Management Microsoft 365 Save Money Remote Monitoring End of Support Vulnerability Solutions Vendor Management Mouse Word User Tip Modem Mobile Security Processor Computer Repair Administration Holidays Data Storage Smart Technology Video Conferencing Safety Machine Learning Supply Chain Managed Services Provider Professional Services Settings Saving Time Virtual Machines Printing Wireless Content Filtering Managed IT Service YouTube Maintenance Downloads Antivirus iPhone Cryptocurrency Licensing Vulnerabilities Customer Relationship Management Entertainment Virtual Desktop Data storage LiFi Data Privacy Images 101 Hacking Presentation Telephone System Robot Outlook Multi-Factor Authentication Mobility Cost Management Money Wireless Technology Humor IT Management VPN Meetings Employees Integration Sports Workplace Strategies Username Managing Costs Education Hard Drives Domains Point of Sale Meta eCommerce Black Friday SSID Database Surveillance Mobile Computing Virtual Assistant Amazon Tech Support IT Technicians Virtual Machine Search Network Management Refrigeration Cyber Monday Medical IT Public Speaking Outsource IT Proxy Server Reviews Monitors Cookies Best Practice Media Tactics Development Hotspot Transportation Buisness Lithium-ion battery Environment Websites Entrepreneur Legal Mirgation Hypervisor IT solutions PowerPoint Small Businesses Shopping Nanotechnology Optimization Business Growth Addiction Language Employer/Employee Relationships SharePoint Displays Electronic Medical Records Undo Management PCI DSS Chatbots Navigation Cortana Distributed Denial of Service Lenovo Outsourcing Gig Economy Writing Screen Reader Alt Codes Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Downtime Virtual Reality Private Cloud Workplace Regulations Compliance Identity Hosted Solution Evernote Server Management Superfish Identity Theft Hiring/Firing Bookmark Smart Tech Memes Typing Paperless Download Net Neutrality Alerts SQL Server Application Twitter Error Co-managed IT Financial Data Google Drive History Knowledge Break Fix IBM Technology Care Browsers Smartwatch Social Engineering Connectivity IT Business Communications Upload Procurement Azure 5G Remote Computing Scams Social Network Telework Google Docs Cyber security Unified Communications Multi-Factor Security Tech Experience Dark Web Running Cable Tablet Hybrid Work CES IoT Communitications Bitcoin Human Resources Trends Supply Chain Management Google Wallet Alert Competition File Sharing Cables Customer Resource management FinTech Dark Data Regulations Google Calendar Term Managed IT Microsoft Excel Laptop Data Analysis How To Star Wars IT Assessment Windows 8 Google Apps Gamification Flexibility Drones Staff Value Notifications Travel IT Maintenance Organization Social Networking Legislation Halloween Techology Google Maps User Business Intelligence Fileless Malware Digital Security Cameras Smart Devices Shortcuts Content Remote Working Wearable Technology Memory Unified Threat Management Ransmoware Health IT Motherboard Data Breach Comparison Google Play Permissions Scary Stories Unified Threat Management IP Address Vendors Directions Videos Assessment Electronic Health Records Hacks Be Proactive Wasting Time Fun Workforce Network Congestion Trend Micro Deep Learning Specifications Security Cameras Fraud User Error Recovery Threats Microchip Internet Exlporer Software as a Service

Blog Archive