Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Vendor Data Security Apps Mobile Office Two-factor Authentication Networking Apple Employer-Employee Relationship App BYOD Mobile Device Management Managed Services Tip of the week Voice over Internet Protocol Chrome Gmail Budget WiFi HIPAA How To BDR Applications Hacker Computing Avoiding Downtime Conferencing Information Technology Marketing Access Control Office 365 Storage Password Managed IT Services Bring Your Own Device Big Data Router Help Desk Operating System Computers Virtual Private Network Risk Management 2FA Website Health Analytics Office Tips Healthcare Augmented Reality Retail Scam Free Resource The Internet of Things Project Management Data loss Windows 7 Social Microsoft 365 Patch Management Solutions Save Money Remote Monitoring Going Green End of Support Vulnerability Vendor Management Monitoring Customer Service Physical Security Cybercrime Display Windows 11 Printer Paperless Office Infrastructure Telephone Excel Remote Workers Firewall Cooperation Document Management Sports Mouse Data Privacy Images 101 Multi-Factor Authentication Mobility Administration Modem User Tip Robot Processor Mobile Security Customer Relationship Management Employees Integration Settings Wireless IT Management Smart Technology Hacking Printing Content Filtering VPN Presentation Meetings YouTube Holidays Saving Time Wireless Technology Computer Repair Cryptocurrency Data Storage Managed IT Service Video Conferencing Downloads Supply Chain Managed Services Provider Virtual Desktop Virtual Machines Professional Services Word Data storage LiFi Licensing Entertainment Machine Learning Outlook iPhone Money Humor Safety Maintenance Telephone System Cost Management Antivirus Vulnerabilities Social Engineering Deep Learning Human Resources Supply Chain Management Content Wearable Technology Motherboard Term Comparison Remote Computing Cables FinTech Health IT Directions Education IT Assessment Assessment Permissions Google Apps Flexibility Value Tablet Specifications Application Alert Mobile Computing IT Maintenance Organization Business Intelligence Digital Security Cameras Microchip Smart Devices Internet Exlporer Search Managed IT Fraud File Sharing Dark Data How To Best Practice Shortcuts Remote Working Username Memory IBM Buisness Data Breach Google Play Black Friday Notifications Ransmoware Legal Vendors Videos IT solutions Electronic Health Records Database Travel Google Maps Business Growth Be Proactive Techology Wasting Time IT Technicians Trend Micro Cookies Security Cameras Cyber Monday Workforce Proxy Server Threats Software as a Service Tactics Cortana Hotspot Competition Unified Threat Management Alt Codes Workplace Strategies Unified Threat Management Managing Costs Mirgation Downtime eCommerce Nanotechnology SSID Meta Network Congestion Amazon Hosted Solution Surveillance Addiction Virtual Assistant Language User Typing Management User Error Virtual Machine Chatbots Screen Reader Medical IT Distributed Denial of Service Outsource IT Reviews Google Drive Environment Media Development Service Level Agreement Knowledge Transportation Computing Infrastructure Point of Sale IP Address Hypervisor Identity Optimization Smart Tech 5G Network Management PowerPoint Tech Support Small Businesses Shopping Bookmark Monitors Google Docs Displays Unified Communications Download Experience Employer/Employee Relationships Alerts Navigation Recovery Bitcoin PCI DSS Running Cable Connectivity Break Fix Hard Drives Websites Google Wallet Outsourcing Gig Economy Browsers Internet Service Provider Upload Teamwork Domains Evernote Multi-Factor Security Electronic Medical Records Windows 8 Workplace Regulations Compliance Social Network Laptop SharePoint Memes IoT Dark Web Refrigeration Drones Hiring/Firing Writing Paperless Net Neutrality Trends Lenovo SQL Server Public Speaking History Regulations Lithium-ion battery Google Calendar Virtual Reality Co-managed IT Financial Data Customer Resource management Halloween Technology Care Smartwatch Data Analysis IT Star Wars Server Management Microsoft Excel Private Cloud Entrepreneur Business Communications Procurement Gamification Superfish Azure Staff Identity Theft Cyber security Social Networking Tech Legislation Twitter Hacks Scams Telework Scary Stories Hybrid Work CES Fileless Malware Communitications Fun Undo Error

Blog Archive