Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Data Recovery VoIP Business Management Smartphones Mobile Devices Disaster Recovery communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Automation Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Holiday Training Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Employee/Employer Relationship Encryption IT Support Office Windows 10 Business Continuity Government Data Management Wi-Fi Windows 10 Business Technology Virtualization Blockchain Bandwidth Apps Vendor Data Security Mobile Office Two-factor Authentication Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Managed Services Voice over Internet Protocol Gmail Tip of the week Chrome Budget HIPAA Applications How To Hacker BDR Avoiding Downtime Marketing Computing Conferencing Information Technology Access Control Office 365 WiFi Storage Password Bring Your Own Device Router Managed IT Services Computers Website 2FA Help Desk Operating System Virtual Private Network Risk Management Healthcare Health Analytics Office Tips Big Data Augmented Reality Retail Scam Solutions Data loss Customer Service Going Green Patch Management Windows 11 Save Money Remote Monitoring Monitoring Vulnerability End of Support Vendor Management Excel Cybercrime Physical Security Firewall Display Remote Workers Printer Telephone Paperless Office Infrastructure The Internet of Things Cooperation Free Resource Project Management Windows 7 Document Management Social Microsoft 365 Maintenance Customer Relationship Management Antivirus Sports Mouse Employees Integration Hacking Administration Presentation User Tip Modem Processor Mobile Security Wireless Technology Holidays Robot Settings Data Storage Printing Smart Technology Supply Chain Wireless Content Filtering Video Conferencing Managed Services Provider IT Management Word Saving Time Virtual Machines VPN Professional Services YouTube Meetings Cryptocurrency Managed IT Service Computer Repair Downloads Safety iPhone Virtual Desktop LiFi Data storage Licensing Entertainment Vulnerabilities Outlook Data Privacy Machine Learning Images 101 Money Humor Multi-Factor Authentication Mobility Telephone System Cost Management Deep Learning Twitter Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Error Health IT Social Engineering Directions Videos Assessment Electronic Health Records Permissions Workforce Education Competition Remote Computing Wasting Time Threats Trend Micro Mobile Computing Specifications Security Cameras Workplace Strategies Search Microchip Internet Exlporer Software as a Service Fraud Meta Tablet Managing Costs Amazon Best Practice Alert Username eCommerce Managed IT Black Friday SSID User Buisness File Sharing Dark Data How To Database Surveillance Legal Virtual Assistant Outsource IT IT solutions IT Technicians Virtual Machine Environment Business Growth Media Notifications Proxy Server Reviews Cookies IP Address Cyber Monday Medical IT Travel Cortana Tactics Development Techology Hotspot Transportation Small Businesses Google Maps Mirgation Hypervisor Displays Alt Codes Shopping Nanotechnology Optimization PowerPoint Recovery Downtime Unified Threat Management Addiction Unified Threat Management Language Employer/Employee Relationships Outsourcing Hard Drives Hosted Solution Chatbots Domains Typing Navigation Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Network Congestion Knowledge Service Level Agreement Internet Service Provider Google Drive User Error Computing Infrastructure Teamwork Hiring/Firing Refrigeration Identity Public Speaking Evernote Paperless Regulations Compliance 5G Bookmark Smart Tech Memes Lithium-ion battery Co-managed IT Point of Sale Unified Communications Entrepreneur Experience Download Net Neutrality Google Docs Alerts SQL Server Technology Care History Bitcoin Network Management Business Communications Running Cable Tech Support Financial Data Monitors Browsers Smartwatch Connectivity IT Google Wallet Break Fix Scams Upload Procurement Azure Hybrid Work Undo Cyber security Windows 8 Multi-Factor Security Tech Human Resources Laptop Websites Social Network Telework CES IoT Communitications Drones Dark Web Cables Electronic Medical Records Trends Supply Chain Management SharePoint Regulations Google Calendar Term Google Apps Halloween Customer Resource management FinTech Writing Data Analysis Star Wars IT Assessment Lenovo Microsoft Excel IT Maintenance Application Virtual Reality Gamification Flexibility Staff Value Business Intelligence Social Networking IBM Hacks Server Management Legislation Shortcuts Scary Stories Private Cloud Organization Fun Fileless Malware Digital Security Cameras Smart Devices Superfish Ransmoware Identity Theft

Blog Archive