Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management AI Smartphones Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Information Facebook Automation Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Vendor Apps Two-factor Authentication Data Security Mobile Office Mobile Device Management Budget BYOD Gmail Apple App Tip of the week Employer-Employee Relationship Networking Managed Services Chrome Voice over Internet Protocol HIPAA Applications WiFi Access Control Computing Conferencing Information Technology Hacker How To Avoiding Downtime Office 365 BDR Marketing Healthcare Storage Password Bring Your Own Device Router Virtual Private Network 2FA Big Data Health Help Desk Operating System Retail Risk Management Computers Managed IT Services Website Analytics Office Tips Augmented Reality Remote Monitoring Vulnerability End of Support Vendor Management Firewall Physical Security Free Resource Windows 11 Project Management Display The Internet of Things Windows 7 Printer Paperless Office Microsoft 365 Excel Infrastructure Going Green Social Solutions Monitoring Document Management Cybercrime Customer Service Scam Data loss Telephone Cooperation Patch Management Save Money Remote Workers Telephone System Cost Management iPhone IT Management Sports VPN Meetings Mouse Vulnerabilities Safety Administration Computer Repair Images 101 User Tip Modem Supply Chain Processor Multi-Factor Authentication Mobile Security Mobility Settings Wireless Machine Learning Smart Technology Printing Content Filtering Employees Customer Relationship Management Integration Saving Time YouTube Maintenance Cryptocurrency Antivirus Managed IT Service Hacking Holidays Data Privacy Presentation Downloads Data Storage Virtual Desktop LiFi Licensing Data storage Wireless Technology Video Conferencing Entertainment Managed Services Provider Professional Services Virtual Machines Outlook Money Robot Word Humor Net Neutrality Social Networking SQL Server Legislation Workplace Strategies Hacks Scary Stories Fileless Malware Fun Financial Data History Unified Threat Management Meta Refrigeration Amazon Public Speaking Deep Learning Smartwatch Unified Threat Management Content IT Wearable Technology Procurement Motherboard Lithium-ion battery Azure Comparison Health IT Education Entrepreneur Directions Telework Assessment Cyber security Permissions Outsource IT Tech Network Congestion Environment Media CES User Error Communitications Supply Chain Management Specifications Mobile Computing Microchip Search FinTech Internet Exlporer Point of Sale Fraud Small Businesses Undo Term Displays Best Practice Username IT Assessment Flexibility Network Management Value Tech Support Black Friday Buisness IT solutions Organization Database Outsourcing Legal Monitors IT Technicians Business Growth Digital Security Cameras Smart Devices Proxy Server Remote Working Cookies Memory Websites Cyber Monday Workplace Application Cortana Tactics Data Breach Hotspot Hiring/Firing Google Play Mirgation IBM Electronic Medical Records Paperless Alt Codes Videos SharePoint Electronic Health Records Nanotechnology Wasting Time Co-managed IT Downtime Hosted Solution Lenovo Addiction Trend Micro Language Technology Care Security Cameras Writing Chatbots Virtual Reality Business Communications Typing Management Software as a Service Server Management Screen Reader Managing Costs Private Cloud Distributed Denial of Service Scams Knowledge Superfish Service Level Agreement eCommerce Identity Theft Computing Infrastructure Hybrid Work Google Drive Competition SSID Surveillance Identity Virtual Assistant Twitter Human Resources Bookmark 5G Smart Tech Virtual Machine Error Cables Medical IT Social Engineering Unified Communications Experience Reviews Download Alerts Google Docs Development Transportation Remote Computing Google Apps Bitcoin User Running Cable Browsers Connectivity Hypervisor Break Fix IT Maintenance Google Wallet PowerPoint Shopping Upload Optimization Tablet Business Intelligence IP Address Employer/Employee Relationships Alert Multi-Factor Security Shortcuts Windows 8 Laptop Social Network PCI DSS Managed IT IoT File Sharing Dark Web Ransmoware Drones Navigation Dark Data How To Gig Economy Trends Vendors Internet Service Provider Regulations Teamwork Notifications Google Calendar Be Proactive Recovery Halloween Customer Resource management Data Analysis Regulations Compliance Star Wars Travel Microsoft Excel Workforce Hard Drives Evernote Domains Techology Gamification Memes Google Maps Staff Threats

Blog Archive