Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Make a QR Code in Chrome

How to Make a QR Code in Chrome

You’ve probably seen QR codes all over the place, especially now that everyone has a built-in scanner right on their smartphone’s camera. They provide businesses with quick and easy ways to share information about resources, whether those resources are instruction manuals, assembly directions, restaurant menus, or even business cards. You can easily make QR codes for your business using a built-in Google Chrome feature.

Continue reading
0 Comments

Tip of the Week: Creating an Event in Google Calendar

Tip of the Week: Creating an Event in Google Calendar

When you receive countless meeting invites or time-sensitive reminders on a day-to-day basis, it’s easy to forget a thing or two here and there. If you get an email, wouldn’t it be better to just make the event right from your inbox so your calendar can remind you about it when the time comes? Google Calendar and Gmail have this functionality built right in.

Continue reading
0 Comments

Tip of the Week: Change Your Android’s Screen Resolution

Tip of the Week: Change Your Android’s Screen Resolution

Have you ever wondered what a different screen resolution might look like on your Android device? Well, now you don’t have to! Today’s tip is all about changing the screen resolution on your device, for better or worse. Let’s take a look at how to do it.

Continue reading
0 Comments

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Many businesses looking to consolidate their tools are turning to cloud services and software suites that offer a centralized collection of solutions—such as the G Suite, as offered by Google. While G Suite offers the Google Drive as a means of organizing your work resources and documents, different files can sometimes be saved in different places. This week, our tip is going to cover how you can work around this fact with a feature called Workspaces.

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade VoIP Business Management Smartphones AI Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Artificial Intelligence Automation Facebook Information Holiday Training Miscellaneous Gadgets Covid-19 Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Virtualization Wi-Fi Blockchain Vendor Mobile Office Apps Data Security Two-factor Authentication Chrome Budget Managed Services Mobile Device Management Voice over Internet Protocol Apple Gmail Tip of the week App Networking Employer-Employee Relationship BYOD Avoiding Downtime Applications Marketing Access Control Conferencing WiFi Computing How To Information Technology BDR Hacker Office 365 HIPAA Router Augmented Reality Website Virtual Private Network Storage Password Health Bring Your Own Device Healthcare Help Desk Retail 2FA Big Data Operating System Managed IT Services Risk Management Computers Office Tips Analytics Physical Security Display Printer Paperless Office Remote Workers Infrastructure Firewall Monitoring Document Management The Internet of Things Going Green Free Resource Windows 11 Project Management Windows 7 Telephone Scam Social Cybercrime Microsoft 365 Excel Data loss Solutions Cooperation Customer Service Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management VPN Money Meetings Data Storage Humor Video Conferencing Managed Services Provider Modem User Tip Computer Repair Processor Virtual Machines Professional Services Mobile Security Word Sports Mouse Smart Technology Administration iPhone Machine Learning Safety Saving Time Vulnerabilities Managed IT Service Images 101 Settings Maintenance Antivirus Printing Downloads Wireless Supply Chain Multi-Factor Authentication Mobility Content Filtering Licensing YouTube Entertainment Cryptocurrency Customer Relationship Management Employees Integration Virtual Desktop Robot Telephone System Cost Management Data storage Hacking LiFi Presentation Holidays Data Privacy Outlook Wireless Technology IT Management IT Maintenance IP Address Specifications Network Congestion Hypervisor Shopping Microchip Optimization Business Intelligence Internet Exlporer PowerPoint User Error Fraud Hacks Scary Stories Username Employer/Employee Relationships Shortcuts Ransmoware Navigation Black Friday Recovery Point of Sale PCI DSS Fun Gig Economy Vendors Database Hard Drives Deep Learning Network Management Tech Support Internet Service Provider Teamwork Be Proactive IT Technicians Domains Workforce Cookies Evernote Cyber Monday Education Monitors Regulations Compliance Proxy Server Memes Threats Tactics Hotspot Refrigeration Mobile Computing Websites Net Neutrality SQL Server Workplace Strategies Mirgation Public Speaking History Meta Nanotechnology Lithium-ion battery Financial Data Search Electronic Medical Records Smartwatch IT Amazon Addiction SharePoint Language Best Practice Entrepreneur Buisness Procurement Management Azure Chatbots Cyber security Outsource IT Screen Reader Tech Lenovo Legal Distributed Denial of Service IT solutions Writing Telework Virtual Reality CES Communitications Environment Service Level Agreement Media Computing Infrastructure Undo Business Growth Server Management Private Cloud Supply Chain Management Identity Bookmark Small Businesses Smart Tech Term Superfish Identity Theft FinTech Cortana Twitter IT Assessment Displays Download Alerts Alt Codes Error Downtime Flexibility Value Browsers Outsourcing Connectivity Break Fix Application Hosted Solution Social Engineering Organization Remote Computing Digital Security Cameras Smart Devices Upload Typing IBM Multi-Factor Security Remote Working Social Network Memory Workplace Data Breach Hiring/Firing IoT Google Play Google Drive Dark Web Tablet Knowledge Alert Videos Electronic Health Records Trends Paperless Regulations Managed IT Google Calendar File Sharing Dark Data 5G Customer Resource management Wasting Time Co-managed IT Data Analysis Trend Micro Technology Care Star Wars Security Cameras Google Docs Microsoft Excel Unified Communications How To Experience Bitcoin Notifications Running Cable Software as a Service Gamification Business Communications Staff Competition Social Networking Google Wallet Legislation Travel Managing Costs Scams Fileless Malware eCommerce Hybrid Work SSID Techology Google Maps Windows 8 Laptop Surveillance Content Virtual Assistant Human Resources Wearable Technology Cables Motherboard Drones Comparison User Unified Threat Management Health IT Virtual Machine Directions Assessment Medical IT Unified Threat Management Permissions Reviews Halloween Development Transportation Google Apps

Blog Archive