Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Backup Productivity Microsoft Managed Service Quick Tips Saving Money Passwords Cybersecurity Communication Smartphone Data Backup AI Android Data Recovery Upgrade Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Holiday Miscellaneous Automation Information Cloud Computing Training Covid-19 Gadgets Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Windows 10 Bandwidth Virtualization Blockchain Business Technology Wi-Fi Data Security Two-factor Authentication Apps Vendor Mobile Office Mobile Device Management Gmail Chrome BYOD Budget WiFi Apple Employer-Employee Relationship App Tip of the week Networking Managed Services Voice over Internet Protocol BDR Conferencing Office 365 Access Control HIPAA Applications Hacker Computing Avoiding Downtime Information Technology How To Marketing Healthcare Analytics Office Tips Augmented Reality Storage Password Virtual Private Network Bring Your Own Device Big Data Health 2FA Router Retail Computers Operating System Managed IT Services Help Desk Risk Management Website Patch Management Save Money Remote Monitoring Firewall End of Support Telephone Vulnerability Vendor Management Free Resource Project Management Windows 7 Physical Security Cooperation The Internet of Things Display Microsoft 365 Printer Paperless Office Windows 11 Social Solutions Infrastructure Excel Document Management Going Green Customer Service Cybercrime Scam Data loss Monitoring Remote Workers Saving Time Virtual Desktop LiFi Word Data storage Robot iPhone Managed IT Service Outlook Vulnerabilities Downloads Money Licensing IT Management Humor Meetings Images 101 Safety VPN Entertainment Multi-Factor Authentication Mobility Sports Computer Repair Mouse Telephone System Cost Management Administration Employees Supply Chain Integration Customer Relationship Management Machine Learning Holidays Settings Wireless Hacking User Tip Printing Modem Mobile Security Content Filtering Presentation Maintenance Processor Data Storage Antivirus Video Conferencing YouTube Managed Services Provider Wireless Technology Virtual Machines Cryptocurrency Professional Services Smart Technology Data Privacy Distributed Denial of Service Hard Drives IT Maintenance How To Net Neutrality Google Wallet Screen Reader SQL Server Service Level Agreement History Computing Infrastructure Domains Business Intelligence Notifications Financial Data Travel Shortcuts Smartwatch IT Windows 8 Identity Laptop Techology Refrigeration Google Maps Ransmoware Bookmark Procurement Drones Smart Tech Azure Download Cyber security Alerts Tech Public Speaking Vendors Telework Unified Threat Management Be Proactive CES Communitications Halloween Lithium-ion battery Unified Threat Management Break Fix Workforce Entrepreneur Browsers Supply Chain Management Connectivity Upload Term Threats FinTech Workplace Strategies Network Congestion Social Network IT Assessment Hacks Scary Stories Multi-Factor Security User Error Dark Web Fun Undo Meta Flexibility IoT Value Organization Trends Deep Learning Amazon Point of Sale Digital Security Cameras Customer Resource management Smart Devices Regulations Google Calendar Memory Education Microsoft Excel Outsource IT Data Analysis Remote Working Star Wars Media Gamification Data Breach Staff Google Play Network Management Environment Tech Support Application Videos Monitors Electronic Health Records Mobile Computing Social Networking Legislation Wasting Time Search Small Businesses Fileless Malware Content Trend Micro Best Practice Wearable Technology Security Cameras IBM Displays Websites Comparison Health IT Software as a Service Motherboard Buisness Assessment Managing Costs IT solutions SharePoint Permissions Outsourcing Electronic Medical Records Directions Legal eCommerce Business Growth SSID Lenovo Specifications Workplace Writing Surveillance Virtual Assistant Internet Exlporer Virtual Machine Fraud Cortana Competition Hiring/Firing Virtual Reality Microchip Private Cloud Paperless Reviews Username Alt Codes Medical IT Server Management Superfish Black Friday Identity Theft Co-managed IT Development Transportation Downtime Database Hypervisor Hosted Solution Technology Care Twitter User Error Business Communications Shopping Optimization Typing IT Technicians PowerPoint Cyber Monday Scams Social Engineering Proxy Server Cookies Employer/Employee Relationships Tactics Hotspot Navigation Knowledge Hybrid Work Remote Computing PCI DSS Google Drive Human Resources Gig Economy Mirgation IP Address 5G Tablet Cables Internet Service Provider Nanotechnology Teamwork Addiction Unified Communications Language Evernote Experience Alert Regulations Compliance Google Docs Recovery File Sharing Google Apps Dark Data Management Memes Bitcoin Chatbots Running Cable Managed IT

Blog Archive