Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Passwords Quick Tips Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade VoIP Smartphones AI Business Management Data Recovery Mobile Devices communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Automation Facebook Information Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Vendor Apps Data Security Two-factor Authentication Mobile Office Networking App Employer-Employee Relationship BYOD Mobile Device Management Chrome Gmail Tip of the week Budget Managed Services Voice over Internet Protocol Apple Applications How To BDR Computing Hacker Information Technology Avoiding Downtime Conferencing Marketing Office 365 Access Control WiFi HIPAA Router Managed IT Services Operating System Help Desk Computers Risk Management Website Virtual Private Network Analytics Office Tips Health Augmented Reality Storage Password 2FA Healthcare Bring Your Own Device Retail Big Data Social Scam Data loss Free Resource Project Management Windows 7 Going Green Microsoft 365 Patch Management Customer Service Monitoring Save Money Cybercrime Solutions Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Display Telephone Printer Paperless Office Infrastructure Firewall Cooperation Windows 11 Document Management Remote Workers The Internet of Things Excel Vulnerabilities User Tip Modem Processor Mobile Security Images 101 Customer Relationship Management Mobility Multi-Factor Authentication Settings Wireless Printing Robot Content Filtering Hacking Smart Technology YouTube Presentation Data Privacy Saving Time Employees Cryptocurrency Wireless Technology Integration IT Management VPN Meetings Managed IT Service Virtual Desktop Data storage Downloads LiFi Holidays Computer Repair Word Licensing Outlook Data Storage Entertainment Money Video Conferencing Humor Managed Services Provider Virtual Machines Professional Services Machine Learning Telephone System Safety Sports Cost Management Mouse Supply Chain iPhone Maintenance Antivirus Administration Application Tech Workplace Specifications Telework Best Practice Cyber security Social Engineering Communitications Remote Computing Buisness Microchip Hiring/Firing Internet Exlporer Fraud CES Paperless Legal Supply Chain Management IT solutions IBM Username Term Co-managed IT Black Friday FinTech Tablet Business Growth IT Assessment Alert Technology Care Database Business Communications IT Technicians Managed IT Flexibility File Sharing Value Dark Data Cortana Proxy Server Scams Cookies Cyber Monday Organization Alt Codes How To Smart Devices Notifications Downtime Competition Hybrid Work Tactics Hotspot Digital Security Cameras Human Resources Mirgation Remote Working Travel Hosted Solution Memory Google Play Cables Nanotechnology Techology Google Maps Typing Data Breach Electronic Health Records Addiction Language Videos Google Apps Chatbots Google Drive Unified Threat Management Wasting Time Knowledge User Management Security Cameras IT Maintenance Screen Reader Unified Threat Management Distributed Denial of Service Trend Micro Software as a Service 5G Business Intelligence Service Level Agreement Computing Infrastructure Shortcuts Identity Google Docs Unified Communications IP Address Managing Costs Network Congestion Experience Running Cable SSID Bookmark Ransmoware Smart Tech User Error Bitcoin eCommerce Google Wallet Surveillance Virtual Assistant Vendors Download Alerts Be Proactive Point of Sale Virtual Machine Recovery Laptop Hard Drives Medical IT Browsers Workforce Connectivity Break Fix Reviews Windows 8 Network Management Drones Development Tech Support Domains Transportation Threats Upload Workplace Strategies Multi-Factor Security Hypervisor Monitors Social Network Halloween Refrigeration PowerPoint Meta IoT Dark Web Shopping Optimization Websites Public Speaking Employer/Employee Relationships Amazon Trends Customer Resource management Regulations Google Calendar PCI DSS Lithium-ion battery Navigation Electronic Medical Records Scary Stories Data Analysis Outsource IT Entrepreneur Star Wars SharePoint Microsoft Excel Gig Economy Hacks Staff Internet Service Provider Teamwork Fun Environment Gamification Media Evernote Social Networking Lenovo Legislation Regulations Compliance Deep Learning Writing Memes Virtual Reality Undo Fileless Malware Small Businesses Wearable Technology Server Management Net Neutrality Private Cloud Education SQL Server Displays Content Health IT Motherboard Superfish Comparison Financial Data Identity Theft History IT Twitter Directions Outsourcing Assessment Permissions Smartwatch Mobile Computing Procurement Error Azure Search

Blog Archive