Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android Upgrade VoIP Business Management Smartphones AI Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Information Facebook Artificial Intelligence Automation Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Server Remote Work Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Office Windows 10 Data Management Government Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Bandwidth Business Technology Mobile Office Vendor Data Security Two-factor Authentication Apps Tip of the week Apple Mobile Device Management App Gmail Networking Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Chrome Budget Avoiding Downtime Marketing HIPAA Applications How To BDR Computing WiFi Information Technology Conferencing Office 365 Access Control Hacker Bring Your Own Device Website Retail Router Managed IT Services Operating System Help Desk Risk Management Big Data Healthcare Analytics Office Tips Virtual Private Network Augmented Reality Computers 2FA Health Storage Password Solutions Document Management Scam Firewall Going Green Data loss Cybercrime Monitoring The Internet of Things Patch Management Save Money Remote Workers Social Remote Monitoring End of Support Vulnerability Vendor Management Telephone Physical Security Free Resource Display Project Management Windows 11 Printer Windows 7 Customer Service Paperless Office Cooperation Microsoft 365 Infrastructure Excel Mouse Telephone System Cost Management Machine Learning Employees Administration Integration Word Maintenance Antivirus Holidays User Tip Modem Mobile Security Data Storage Data Privacy Settings Processor Wireless Printing Video Conferencing Content Filtering Safety Managed Services Provider YouTube Professional Services Virtual Machines Smart Technology Robot Cryptocurrency Saving Time Virtual Desktop iPhone Managed IT Service Data storage LiFi IT Management Meetings VPN Vulnerabilities Customer Relationship Management Downloads Outlook Licensing Computer Repair Images 101 Money Hacking Humor Entertainment Presentation Multi-Factor Authentication Mobility Supply Chain Sports Wireless Technology Legislation Electronic Health Records Workplace SharePoint Education Electronic Medical Records IP Address Social Networking Videos Hiring/Firing Wasting Time Fileless Malware Security Cameras Content Writing Wearable Technology Mobile Computing Trend Micro Paperless Lenovo Recovery Comparison Software as a Service Co-managed IT Search Health IT Virtual Reality Motherboard Assessment Hard Drives Permissions Technology Care Best Practice Managing Costs Server Management Directions Private Cloud Superfish Buisness SSID Identity Theft Domains eCommerce Business Communications Specifications Legal Surveillance Scams IT solutions Virtual Assistant Twitter Error Internet Exlporer Refrigeration Fraud Hybrid Work Business Growth Virtual Machine Microchip Human Resources Medical IT Username Social Engineering Public Speaking Reviews Black Friday Development Cables Transportation Cortana Remote Computing Lithium-ion battery Database Entrepreneur Alt Codes Hypervisor Google Apps Downtime PowerPoint Tablet IT Technicians Shopping Optimization Cyber Monday IT Maintenance Hosted Solution Employer/Employee Relationships Proxy Server Alert Cookies File Sharing Tactics Dark Data Undo Hotspot PCI DSS Business Intelligence Typing Managed IT Navigation Shortcuts How To Mirgation Gig Economy Google Drive Internet Service Provider Ransmoware Teamwork Knowledge Notifications Nanotechnology Travel Addiction Language Regulations Compliance Vendors Evernote Be Proactive Techology Google Maps 5G Management Chatbots Memes Application Distributed Denial of Service Google Docs Net Neutrality Workforce Unified Communications SQL Server Experience Screen Reader Unified Threat Management Service Level Agreement Computing Infrastructure Financial Data Threats Bitcoin History Running Cable Workplace Strategies Unified Threat Management IBM Identity Smartwatch Google Wallet IT Procurement Meta Azure Bookmark Smart Tech Download Network Congestion Alerts Telework Amazon Windows 8 Cyber security Laptop Tech User Error CES Drones Communitications Break Fix Supply Chain Management Outsource IT Browsers Connectivity Point of Sale Upload Competition FinTech Environment Media Halloween Term Social Network Multi-Factor Security IT Assessment IoT Dark Web Flexibility Small Businesses Value Network Management Tech Support Trends Monitors Organization Displays Hacks Scary Stories User Google Calendar Smart Devices Fun Customer Resource management Regulations Digital Security Cameras Star Wars Microsoft Excel Remote Working Outsourcing Deep Learning Memory Data Analysis Websites Google Play Gamification Staff Data Breach

Blog Archive