Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing Privacy IT Support Workplace Tips Email Google Computer Workplace Strategy Backup Small Business Collaboration Hosted Solutions Managed Service AI Ransomware Users Productivity Mobile Device Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Training Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Outsourced IT Compliance Gadgets Remote Work Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Government Data Management Business Continuity Vendor Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Mobile Office Two-factor Authentication Tip of the week Managed Services Apps Data Security BYOD Mobile Device Management Chrome Gmail Budget Voice over Internet Protocol WiFi Networking Apple Employer-Employee Relationship App HIPAA Hacker Computing Physical Security Applications Avoiding Downtime Information Technology Marketing Access Control Office 365 Conferencing Password Managed IT Services How To BDR Operating System Computers Router Virtual Private Network Risk Management Website Health 2FA Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Big Data Bring Your Own Device Customer Service Remote Monitoring Vulnerability End of Support Solutions Vendor Management Cybercrime Display Printer Paperless Office Windows 11 Infrastructure Monitoring Firewall Excel Document Management Remote Workers Managed IT Service The Internet of Things Telephone Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Patch Management Going Green Microsoft 365 Save Money Settings Printing Wireless Hacking Presentation Content Filtering IT Management VPN Employees Meetings YouTube Wireless Technology Integration Cryptocurrency User Tip Modem Processor Mobile Security Computer Repair Holidays Virtual Desktop Data storage Word LiFi Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Saving Time Money Virtual Machines Professional Services Humor Safety Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy Images 101 Customer Relationship Management Telephone System Multi-Factor Authentication Mobility Robot Cost Management Wearable Technology Memory Vendors Content Remote Working Alt Codes Health IT Unified Threat Management Motherboard Data Breach Downtime Comparison Google Play Be Proactive Unified Threat Management Directions Videos Assessment Electronic Health Records Hosted Solution Permissions Workforce Wasting Time Threats User Typing Trend Micro Specifications Security Cameras Workplace Strategies Network Congestion User Error Microchip Google Drive Internet Exlporer Software as a Service Fraud Meta Knowledge Managing Costs Amazon IP Address Username Point of Sale eCommerce Black Friday SSID 5G Google Docs Database Surveillance Unified Communications Virtual Assistant Outsource IT Experience Tech Support IT Technicians Virtual Machine Environment Running Cable Media Recovery Network Management Bitcoin Proxy Server Reviews Google Wallet Cookies Cyber Monday Medical IT Monitors Hard Drives Domains Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Laptop Windows 8 Shopping Drones Nanotechnology Optimization PowerPoint Refrigeration Public Speaking SharePoint Addiction Language Employer/Employee Relationships Outsourcing Electronic Medical Records Chatbots Halloween Navigation Lithium-ion battery Management PCI DSS Lenovo Gig Economy Entrepreneur Screen Reader Distributed Denial of Service Workplace Writing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Virtual Reality Private Cloud Identity Scary Stories Evernote Paperless Server Management Regulations Compliance Hacks Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Fun Undo Download Net Neutrality Deep Learning Alerts SQL Server Technology Care Twitter Error History Business Communications Financial Data Browsers Smartwatch Connectivity IT Education Break Fix Scams Social Engineering Upload Procurement Azure Hybrid Work Remote Computing Cyber security Multi-Factor Security Tech Human Resources Application Social Network Telework Mobile Computing CES Tablet IoT Communitications Dark Web Cables Search IBM Trends Supply Chain Management Best Practice Alert File Sharing Regulations Buisness Google Calendar Term Google Apps Dark Data Managed IT Customer Resource management FinTech Data Analysis Legal Star Wars IT Assessment IT solutions Microsoft Excel IT Maintenance How To Gamification Flexibility Business Growth Staff Value Business Intelligence Notifications Organization Travel Social Networking Legislation Shortcuts Competition Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Cortana

Blog Archive