Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Productivity Microsoft Managed Service Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Automation Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Data Security Two-factor Authentication Mobile Office Vendor Apps Networking BYOD Chrome Mobile Device Management Budget Gmail Apple Tip of the week WiFi App Managed Services Voice over Internet Protocol Employer-Employee Relationship Computing How To Information Technology BDR Hacker Avoiding Downtime Office 365 HIPAA Marketing Applications Access Control Conferencing Managed IT Services Risk Management Computers Office Tips Analytics Website Router Augmented Reality Physical Security Virtual Private Network Storage Password Health Bring Your Own Device Help Desk 2FA Big Data Retail Operating System Healthcare Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Solutions Display Firewall Printer Paperless Office Infrastructure Windows 11 Monitoring The Internet of Things Document Management Excel Going Green Social Telephone Remote Workers Scam Data loss Cybercrime iPhone YouTube Entertainment Cryptocurrency Vulnerabilities Hacking Data Privacy Presentation Telephone System Virtual Desktop Images 101 Robot Data storage LiFi Cost Management Wireless Technology Multi-Factor Authentication Mobility Outlook IT Management Money VPN Meetings Word Humor Employees Integration User Tip Modem Computer Repair Mobile Security Processor Sports Mouse Safety Holidays Administration Smart Technology Data Storage Supply Chain Machine Learning Video Conferencing Saving Time Managed Services Provider Professional Services Virtual Machines Managed IT Service Settings Maintenance Printing Antivirus Wireless Downloads Content Filtering Customer Relationship Management Licensing Scams Social Network Smartwatch Multi-Factor Security IT Dark Web Procurement Azure Hybrid Work Google Drive Tablet IoT Competition Knowledge Trends Alert Telework Cyber security Tech Human Resources Cables Managed IT Customer Resource management File Sharing Regulations CES 5G Dark Data Google Calendar Communitications Experience How To Microsoft Excel Supply Chain Management Google Docs Data Analysis Unified Communications Star Wars Bitcoin Gamification Running Cable Notifications Staff User FinTech Term Google Apps IT Maintenance Google Wallet Travel Social Networking Legislation IT Assessment Flexibility Value Business Intelligence Techology Fileless Malware Google Maps Windows 8 Content IP Address Laptop Wearable Technology Organization Shortcuts Smart Devices Ransmoware Drones Health IT Unified Threat Management Motherboard Digital Security Cameras Comparison Permissions Remote Working Memory Vendors Unified Threat Management Directions Assessment Google Play Be Proactive Halloween Recovery Data Breach Electronic Health Records Workforce Hard Drives Videos Network Congestion Specifications Fraud Wasting Time Threats User Error Microchip Internet Exlporer Domains Security Cameras Workplace Strategies Hacks Username Scary Stories Trend Micro Software as a Service Meta Point of Sale Refrigeration Fun Black Friday Managing Costs Amazon Deep Learning Database Public Speaking SSID Network Management Lithium-ion battery Tech Support IT Technicians eCommerce Surveillance Virtual Assistant Outsource IT Proxy Server Education Cookies Monitors Cyber Monday Entrepreneur Hotspot Virtual Machine Environment Media Tactics Medical IT Mobile Computing Websites Mirgation Reviews Development Transportation Small Businesses Nanotechnology Undo Search Electronic Medical Records Language Hypervisor Displays SharePoint Best Practice Addiction PowerPoint Management Buisness Chatbots Shopping Optimization Employer/Employee Relationships Outsourcing Legal Lenovo IT solutions Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure PCI DSS Navigation Business Growth Service Level Agreement Workplace Server Management Private Cloud Identity Application Gig Economy Internet Service Provider Teamwork Hiring/Firing Superfish Bookmark Identity Theft Smart Tech Cortana IBM Twitter Alerts Regulations Compliance Evernote Paperless Alt Codes Download Co-managed IT Downtime Error Memes Net Neutrality SQL Server Technology Care Browsers Hosted Solution Connectivity Social Engineering Break Fix Upload Remote Computing Financial Data History Business Communications Typing

Blog Archive