Error
  • Error loading component: com_advancedmodules, 1

Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Make a QR Code in Chrome

How to Make a QR Code in Chrome

You’ve probably seen QR codes all over the place, especially now that everyone has a built-in scanner right on their smartphone’s camera. They provide businesses with quick and easy ways to share information about resources, whether those resources are instruction manuals, assembly directions, restaurant menus, or even business cards. You can easily make QR codes for your business using a built-in Google Chrome feature.

Continue reading
0 Comments

Tip of the Week: Creating an Event in Google Calendar

Tip of the Week: Creating an Event in Google Calendar

When you receive countless meeting invites or time-sensitive reminders on a day-to-day basis, it’s easy to forget a thing or two here and there. If you get an email, wouldn’t it be better to just make the event right from your inbox so your calendar can remind you about it when the time comes? Google Calendar and Gmail have this functionality built right in.

Continue reading
0 Comments

Tip of the Week: Change Your Android’s Screen Resolution

Tip of the Week: Change Your Android’s Screen Resolution

Have you ever wondered what a different screen resolution might look like on your Android device? Well, now you don’t have to! Today’s tip is all about changing the screen resolution on your device, for better or worse. Let’s take a look at how to do it.

Continue reading
0 Comments

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Many businesses looking to consolidate their tools are turning to cloud services and software suites that offer a centralized collection of solutions—such as the G Suite, as offered by Google. While G Suite offers the Google Drive as a means of organizing your work resources and documents, different files can sometimes be saved in different places. This week, our tip is going to cover how you can work around this fact with a feature called Workspaces.

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management Smartphones AI Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Facebook Automation Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Managed Service Provider Remote Work Server Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Government Business Continuity Data Management Bandwidth Windows 10 Virtualization Blockchain Business Technology Wi-Fi Apps Vendor Two-factor Authentication Data Security Mobile Office Chrome Mobile Device Management Budget BYOD Gmail Managed Services Voice over Internet Protocol Apple App Tip of the week Employer-Employee Relationship Networking Conferencing WiFi Access Control HIPAA Computing Applications Information Technology Hacker How To Avoiding Downtime Office 365 BDR Marketing Augmented Reality Storage Password Bring Your Own Device Healthcare Virtual Private Network Big Data Health Operating System 2FA Router Retail Risk Management Computers Managed IT Services Help Desk Analytics Website Office Tips Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Firewall Telephone Physical Security Remote Workers Display Printer The Internet of Things Cooperation Paperless Office Infrastructure Social Free Resource Going Green Project Management Windows 7 Document Management Windows 11 Microsoft 365 Cybercrime Solutions Customer Service Excel Scam Data loss Monitoring Robot Data Storage Saving Time Money Humor Word Video Conferencing Data Privacy Managed IT Service Managed Services Provider Virtual Machines Professional Services Downloads IT Management Sports Meetings VPN Mouse Licensing Safety Administration Entertainment iPhone Computer Repair Vulnerabilities Telephone System Cost Management Settings Images 101 Wireless Printing Machine Learning Mobility Content Filtering Multi-Factor Authentication Customer Relationship Management YouTube Supply Chain Maintenance Cryptocurrency Hacking Antivirus User Tip Modem Presentation Mobile Security Employees Processor Integration Virtual Desktop Data storage LiFi Wireless Technology Smart Technology Outlook Holidays Screen Reader Hard Drives Distributed Denial of Service Human Resources Hypervisor Travel Optimization Techology PowerPoint Google Maps Service Level Agreement Domains Computing Infrastructure Cables Shopping Employer/Employee Relationships Hacks Identity Scary Stories Navigation Unified Threat Management Smart Tech Refrigeration Google Apps Fun PCI DSS Bookmark Unified Threat Management Download Deep Learning Public Speaking Alerts IT Maintenance Gig Economy Internet Service Provider Teamwork Lithium-ion battery Business Intelligence Evernote Connectivity Education Network Congestion Break Fix Shortcuts Entrepreneur Regulations Compliance Browsers Memes User Error Upload Ransmoware Multi-Factor Security Net Neutrality SQL Server Social Network Mobile Computing Vendors Point of Sale IoT Undo Dark Web Be Proactive Search Financial Data History IT Trends Best Practice Workforce Smartwatch Google Calendar Procurement Azure Network Management Customer Resource management Tech Support Regulations Threats Buisness Tech Star Wars IT solutions Monitors Microsoft Excel Workplace Strategies Telework Cyber security Data Analysis Legal Communitications Gamification Business Growth Staff Meta CES Legislation Supply Chain Management Websites Social Networking Amazon Application Term Cortana FinTech Fileless Malware IT Assessment SharePoint Content Alt Codes IBM Electronic Medical Records Wearable Technology Outsource IT Comparison Media Flexibility Value Health IT Motherboard Environment Downtime Assessment Hosted Solution Writing Permissions Organization Lenovo Directions Smart Devices Typing Virtual Reality Small Businesses Digital Security Cameras Displays Specifications Remote Working Memory Server Management Private Cloud Google Drive Google Play Identity Theft Internet Exlporer Competition Fraud Knowledge Data Breach Superfish Microchip Electronic Health Records Username Twitter Outsourcing Videos Black Friday 5G Wasting Time Error Google Docs Security Cameras Database Unified Communications Social Engineering Workplace Experience Trend Micro Software as a Service Bitcoin Remote Computing IT Technicians Hiring/Firing Running Cable User Cyber Monday Paperless Managing Costs Proxy Server Google Wallet Cookies SSID Tablet Tactics Hotspot Co-managed IT eCommerce Surveillance Virtual Assistant Windows 8 IP Address Alert Mirgation Technology Care Laptop Dark Data Business Communications Virtual Machine Managed IT Drones File Sharing Nanotechnology Medical IT Addiction How To Language Scams Reviews Development Transportation Management Notifications Chatbots Hybrid Work Halloween Recovery

Blog Archive