Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Gadgets Training Covid-19 Cloud Computing Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Vendor Apps Two-factor Authentication Mobile Office Data Security App Employer-Employee Relationship Tip of the week Mobile Device Management Managed Services Chrome Networking Voice over Internet Protocol Gmail Budget WiFi Apple BYOD Applications Access Control Computing Hacker Information Technology Avoiding Downtime Conferencing Marketing Office 365 How To BDR HIPAA Router Physical Security Virtual Private Network Operating System Health Computers Help Desk Risk Management Website 2FA Retail Office Tips Analytics Augmented Reality Managed IT Services Healthcare Storage Password Bring Your Own Device Big Data Microsoft 365 Going Green Display Solutions Printer Paperless Office Customer Service Cybercrime Infrastructure Monitoring Document Management Windows 11 Telephone Excel Scam Data loss Firewall Remote Workers Cooperation Patch Management The Internet of Things Save Money Free Resource Remote Monitoring Vulnerability Project Management End of Support Windows 7 Social Vendor Management VPN Meetings Multi-Factor Authentication Mobility User Tip Modem Customer Relationship Management Computer Repair Mobile Security Settings Processor Printing Wireless Content Filtering Employees Integration Hacking Presentation YouTube Smart Technology Cryptocurrency Machine Learning Wireless Technology Saving Time Holidays Data Storage Virtual Desktop Data storage Managed IT Service LiFi Supply Chain Maintenance Video Conferencing Antivirus Managed Services Provider Downloads Word Outlook Virtual Machines Professional Services Licensing Money Entertainment Humor Safety iPhone Sports Telephone System Mouse Robot Cost Management Vulnerabilities Data Privacy Administration Images 101 IT Management Organization Legal IBM Network Congestion Specifications IT solutions Shortcuts Business Growth Ransmoware User Error Microchip Digital Security Cameras Internet Exlporer Smart Devices Fraud Username Remote Working Memory Vendors Cortana Point of Sale Data Breach Black Friday Google Play Be Proactive Alt Codes Workforce Videos Database Electronic Health Records Network Management Tech Support IT Technicians Wasting Time Threats Competition Downtime Proxy Server Cookies Trend Micro Monitors Cyber Monday Hosted Solution Security Cameras Workplace Strategies Hotspot Typing Meta Tactics Software as a Service Websites Mirgation Managing Costs Amazon Knowledge Nanotechnology Google Drive eCommerce SSID User Electronic Medical Records Language Virtual Assistant Outsource IT SharePoint Addiction Surveillance Management Chatbots Virtual Machine Environment Media 5G Experience Lenovo Reviews Screen Reader Google Docs IP Address Writing Distributed Denial of Service Unified Communications Medical IT Virtual Reality Computing Infrastructure Bitcoin Transportation Small Businesses Running Cable Service Level Agreement Development Server Management Private Cloud Identity Google Wallet Hypervisor Displays Superfish Bookmark Shopping Identity Theft Smart Tech Optimization PowerPoint Recovery Twitter Alerts Windows 8 Employer/Employee Relationships Outsourcing Hard Drives Laptop Download PCI DSS Error Drones Domains Navigation Browsers Gig Economy Connectivity Social Engineering Break Fix Workplace Remote Computing Teamwork Hiring/Firing Refrigeration Halloween Upload Internet Service Provider Social Network Regulations Compliance Public Speaking Multi-Factor Security Evernote Paperless Tablet IoT Memes Lithium-ion battery Dark Web Co-managed IT Alert Hacks SQL Server Technology Care Scary Stories Entrepreneur Trends Net Neutrality Managed IT Customer Resource management Financial Data File Sharing Regulations History Dark Data Google Calendar Business Communications Fun Data Analysis Smartwatch Star Wars IT How To Microsoft Excel Deep Learning Scams Notifications Staff Azure Hybrid Work Undo Gamification Procurement Telework Travel Social Networking Cyber security Legislation Education Tech Human Resources Techology Fileless Malware CES Google Maps Communitications Cables Supply Chain Management Wearable Technology Mobile Computing Content Health IT FinTech Unified Threat Management Motherboard Comparison Term Google Apps Search Best Practice IT Maintenance Application Unified Threat Management Directions Assessment IT Assessment Permissions Flexibility Value Business Intelligence Buisness

Blog Archive