Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade VoIP Smartphones AI Business Management Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Remote Work Managed Service Provider Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Mobile Office Two-factor Authentication Apple Employer-Employee Relationship App BYOD Tip of the week Mobile Device Management Chrome Gmail Budget Managed Services Networking Voice over Internet Protocol BDR HIPAA Hacker Applications Computing Avoiding Downtime Access Control Information Technology Marketing Office 365 Conferencing WiFi How To Computers Router Operating System Virtual Private Network 2FA Health Risk Management Website Help Desk Analytics Office Tips Retail Augmented Reality Storage Password Managed IT Services Big Data Bring Your Own Device Healthcare Cooperation Social Patch Management Save Money Free Resource Remote Monitoring End of Support Project Management Vulnerability Going Green Vendor Management Windows 7 Customer Service Microsoft 365 Physical Security Windows 11 Display Cybercrime Solutions Printer Paperless Office Excel Infrastructure Monitoring Document Management Firewall Scam Telephone Data loss The Internet of Things Remote Workers iPhone Administration Robot Vulnerabilities Telephone System Customer Relationship Management Cost Management Images 101 IT Management Meetings Multi-Factor Authentication Settings Mobility VPN Wireless Hacking Printing Content Filtering Presentation Computer Repair YouTube User Tip Supply Chain Modem Wireless Technology Mobile Security Employees Cryptocurrency Processor Integration Virtual Desktop Data storage Machine Learning Word LiFi Smart Technology Holidays Outlook Data Storage Saving Time Maintenance Money Video Conferencing Humor Managed Services Provider Antivirus Managed IT Service Safety Virtual Machines Professional Services Data Privacy Downloads Licensing Sports Mouse Entertainment Trends Smartwatch Application Mobile Computing How To IT Vendors Azure Customer Resource management Search Be Proactive Regulations Google Calendar Notifications Procurement Microsoft Excel IBM Travel Telework Best Practice Cyber security Data Analysis Tech Workforce Star Wars Gamification Techology Staff Google Maps CES Communitications Buisness Threats IT solutions Workplace Strategies Social Networking Legislation Legal Supply Chain Management Unified Threat Management FinTech Business Growth Fileless Malware Term Meta Content Unified Threat Management Wearable Technology IT Assessment Amazon Flexibility Value Health IT Cortana Motherboard Comparison Competition Permissions Organization Alt Codes Network Congestion Directions Outsource IT Assessment Environment User Error Media Digital Security Cameras Smart Devices Downtime Remote Working Hosted Solution Memory Specifications Fraud Point of Sale User Typing Data Breach Microchip Google Play Small Businesses Internet Exlporer Displays Username Videos Electronic Health Records Wasting Time Knowledge Network Management Black Friday Google Drive Tech Support IP Address Monitors Trend Micro Security Cameras Outsourcing Database 5G IT Technicians Software as a Service Google Docs Websites Unified Communications Managing Costs Proxy Server Experience Workplace Cookies Cyber Monday Hotspot Recovery Bitcoin eCommerce Running Cable SSID Hiring/Firing Tactics Virtual Assistant SharePoint Paperless Mirgation Hard Drives Google Wallet Electronic Medical Records Surveillance Domains Virtual Machine Co-managed IT Nanotechnology Lenovo Language Reviews Windows 8 Writing Laptop Medical IT Technology Care Addiction Transportation Management Business Communications Chatbots Refrigeration Drones Virtual Reality Development Public Speaking Private Cloud Hypervisor Scams Screen Reader Server Management Distributed Denial of Service Superfish Computing Infrastructure Lithium-ion battery Identity Theft Shopping Optimization Halloween PowerPoint Hybrid Work Service Level Agreement Entrepreneur Employer/Employee Relationships Human Resources Identity Twitter Error PCI DSS Bookmark Navigation Cables Smart Tech Alerts Gig Economy Hacks Social Engineering Scary Stories Download Teamwork Fun Google Apps Undo Remote Computing Internet Service Provider Regulations Compliance Deep Learning Browsers Evernote IT Maintenance Connectivity Break Fix Tablet Memes Business Intelligence Upload Education SQL Server Social Network Shortcuts Multi-Factor Security Alert Net Neutrality File Sharing Financial Data Dark Data History Ransmoware IoT Managed IT Dark Web

Blog Archive