Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Mobile Office Two-factor Authentication Apps Data Security Vendor Mobile Device Management Tip of the week Chrome Gmail Managed Services Voice over Internet Protocol Budget WiFi Apple Networking Employer-Employee Relationship App BYOD Avoiding Downtime Applications Information Technology Marketing Access Control Office 365 Conferencing How To BDR Hacker HIPAA Computing 2FA Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Big Data Bring Your Own Device Managed IT Services Computers Operating System Router Physical Security Display Printer Excel Paperless Office Infrastructure Monitoring Firewall Document Management Remote Workers The Internet of Things Telephone Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Customer Service Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Windows 11 Cryptocurrency User Tip Supply Chain Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage Word LiFi Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Safety Managed IT Service Data Privacy Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Administration Vulnerabilities Entertainment Images 101 Customer Relationship Management Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Hacking Printing Content Filtering Presentation IT Management VPN Employees YouTube Meetings Integration Wireless Technology IP Address Displays Username Managing Costs 5G Black Friday SSID Point of Sale eCommerce Outsourcing Unified Communications Database Surveillance Experience Virtual Assistant Google Docs Recovery Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Hard Drives Google Wallet Proxy Server Reviews Workplace Cookies Hiring/Firing Tactics Development Hotspot Transportation Domains Windows 8 Paperless Laptop Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Refrigeration Drones Shopping Co-managed IT SharePoint Technology Care Addiction Electronic Medical Records Language Employer/Employee Relationships Public Speaking Navigation Lithium-ion battery Management PCI DSS Business Communications Halloween Chatbots Screen Reader Writing Distributed Denial of Service Lenovo Gig Economy Scams Entrepreneur Hybrid Work Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Evernote Hacks Server Management Regulations Compliance Human Resources Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Fun Undo Superfish Bookmark Cables Deep Learning Download Net Neutrality Twitter Alerts SQL Server Financial Data Google Apps Error History IT Maintenance Education Connectivity IT Social Engineering Break Fix Browsers Smartwatch Business Intelligence Upload Procurement Remote Computing Azure Multi-Factor Security Tech Application Mobile Computing Social Network Telework Shortcuts Cyber security Ransmoware Tablet IoT Communitications Search Dark Web CES IBM Vendors Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Be Proactive Buisness File Sharing Regulations Workforce IT solutions Star Wars IT Assessment How To Microsoft Excel Legal Data Analysis Threats Business Growth Gamification Flexibility Notifications Staff Value Legislation Organization Workplace Strategies Travel Social Networking Meta Google Maps Smart Devices Cortana Competition Techology Fileless Malware Digital Security Cameras Amazon Alt Codes Content Remote Working Wearable Technology Memory Comparison Google Play Health IT Downtime Unified Threat Management Motherboard Data Breach Outsource IT Hosted Solution Assessment Electronic Health Records Permissions Unified Threat Management Directions Videos Environment User Typing Media Wasting Time Network Congestion Specifications Security Cameras Trend Micro Small Businesses Internet Exlporer Software as a Service Knowledge Fraud Google Drive User Error Microchip

Blog Archive