Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Collaboration Users Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service VoIP Business Management Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Windows Managed IT Services Microsoft Office Current Events Tech Term Network Remote Internet of Things Productivity Facebook Automation Artificial Intelligence Gadgets Cloud Computing AI Covid-19 Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Holiday Information Encryption Compliance Spam Training Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Business Technology Data Security Apps Vendor Two-factor Authentication IT Support Mobile Office Mobile Device Management Budget Gmail Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Chrome Conferencing How To WiFi BDR Computing Information Technology Hacker HIPAA Access Control Avoiding Downtime Applications Office 365 Tip of the week Marketing Help Desk Retail Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Virtual Private Network Risk Management Computers Router Health Website Office Tips Analytics Augmented Reality Monitoring 2FA Firewall Excel Scam Data loss Remote Workers The Internet of Things Telephone Going Green Patch Management Social Save Money Remote Monitoring Cooperation Free Resource Vulnerability Project Management End of Support Vendor Management Windows 7 Cybercrime Physical Security Microsoft 365 Customer Service Display Solutions Printer Paperless Office Infrastructure Windows 11 Document Management Data Storage Smart Technology Supply Chain Maintenance Video Conferencing Antivirus Sports Managed Services Provider Professional Services Mouse Saving Time Virtual Machines Safety Managed IT Service Administration Downloads iPhone Licensing Robot Vulnerabilities Entertainment Settings Data Privacy Printing Wireless Content Filtering Images 101 IT Management Customer Relationship Management Mobility VPN Telephone System YouTube Meetings Multi-Factor Authentication Cost Management Cryptocurrency Hacking Computer Repair Presentation Employees Virtual Desktop Wireless Technology Integration Data storage LiFi User Tip Modem Mobile Security Outlook Processor Machine Learning Money Holidays Word Humor Hacks Server Management Scary Stories Private Cloud Mirgation Hypervisor Displays PowerPoint Superfish Shopping Identity Theft Refrigeration Nanotechnology Optimization Fun Deep Learning Public Speaking Addiction Twitter Language Employer/Employee Relationships Outsourcing Lithium-ion battery Management PCI DSS Error Chatbots Navigation Social Engineering Entrepreneur Distributed Denial of Service Workplace Gig Economy Education Screen Reader Service Level Agreement Internet Service Provider Remote Computing Computing Infrastructure Teamwork Hiring/Firing Mobile Computing Regulations Compliance Identity Evernote Paperless Smart Tech Memes Search Co-managed IT Bookmark Tablet Undo Best Practice Download Net Neutrality Alert Alerts SQL Server Technology Care Business Communications Managed IT Financial Data Buisness File Sharing History Dark Data Connectivity IT How To Break Fix Scams Legal Browsers Smartwatch IT solutions Business Growth Upload Procurement Notifications Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Travel Application Cyber security IoT Communitications Cortana Dark Web Cables Techology CES Google Maps Alt Codes IBM Trends Supply Chain Management Google Calendar Term Google Apps Customer Resource management FinTech Downtime Unified Threat Management Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Unified Threat Management Data Analysis Hosted Solution Typing Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Organization Social Networking Network Congestion Smart Devices Knowledge Ransmoware Google Drive User Error Fileless Malware Digital Security Cameras Competition Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Point of Sale Motherboard Data Breach 5G Assessment Electronic Health Records Experience Permissions Workforce Google Docs Directions Videos Unified Communications Bitcoin Network Management Running Cable Tech Support User Wasting Time Threats Specifications Security Cameras Workplace Strategies Google Wallet Trend Micro Monitors Internet Exlporer Software as a Service Fraud Meta Microchip Windows 8 IP Address Username Laptop Websites Managing Costs Amazon Black Friday SSID Drones eCommerce Database Surveillance Electronic Medical Records Virtual Assistant Outsource IT SharePoint Halloween Recovery IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Lenovo Proxy Server Reviews Hard Drives Cookies Writing Domains Tactics Development Virtual Reality Hotspot Transportation Small Businesses

Blog Archive