Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords AI Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Facebook Miscellaneous Automation Covid-19 Compliance Cloud Computing Training Gadgets Outsourced IT Server Managed Service Provider Remote Work IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Bandwidth Windows 10 Virtualization Blockchain Business Technology Vendor Apps Two-factor Authentication Mobile Office Data Security Managed Services Employer-Employee Relationship Tip of the week Networking Chrome Mobile Device Management Budget Gmail BYOD Apple WiFi App Voice over Internet Protocol Computing Applications Information Technology Hacker Avoiding Downtime Office 365 Managed IT Services How To Marketing Conferencing BDR Password Physical Security Access Control HIPAA Operating System Router Risk Management Retail Computers Help Desk Website Analytics Office Tips Augmented Reality Storage Bring Your Own Device Virtual Private Network 2FA Big Data Health Healthcare Cybercrime Document Management Customer Service Free Resource Project Management Windows 7 Monitoring Scam Microsoft 365 Data loss Solutions Managed IT Service Patch Management Telephone Save Money Firewall Remote Monitoring Vulnerability End of Support Vendor Management Cooperation The Internet of Things Windows 11 Display Printer Paperless Office Social Going Green Excel Remote Workers Infrastructure iPhone Content Filtering Customer Relationship Management Machine Learning YouTube Vulnerabilities User Tip Modem Mobile Security Cryptocurrency Processor Hacking Presentation Images 101 Maintenance Antivirus Data Privacy Virtual Desktop Multi-Factor Authentication Mobility Wireless Technology Smart Technology Data storage LiFi Outlook Saving Time Money Employees Integration Word Humor Robot Downloads Sports Licensing Mouse Holidays IT Management Entertainment VPN Data Storage Safety Meetings Administration Video Conferencing Managed Services Provider Computer Repair Professional Services Telephone System Virtual Machines Cost Management Supply Chain Settings Printing Wireless Specifications Electronic Medical Records Paperless Hosted Solution SharePoint Smartwatch IT Internet Exlporer Procurement Fraud Azure Co-managed IT Typing Microchip Technology Care Username Lenovo Telework Cyber security Writing Tech Black Friday Virtual Reality Google Drive Business Communications CES Knowledge Communitications Competition Database Server Management Supply Chain Management Private Cloud Scams Hybrid Work Superfish FinTech 5G IT Technicians Identity Theft Term Cyber Monday Twitter Google Docs Human Resources Unified Communications Proxy Server Experience Cookies IT Assessment Running Cable Tactics Flexibility Hotspot Error Value User Cables Bitcoin Google Wallet Organization Mirgation Social Engineering Smart Devices Remote Computing Google Apps Digital Security Cameras Nanotechnology Laptop Addiction Remote Working IP Address Language Memory IT Maintenance Windows 8 Google Play Business Intelligence Drones Management Chatbots Tablet Data Breach Electronic Health Records Distributed Denial of Service Alert Shortcuts Videos Screen Reader Halloween Service Level Agreement Managed IT Computing Infrastructure File Sharing Wasting Time Recovery Dark Data Ransmoware Security Cameras Vendors Identity Trend Micro Hard Drives How To Software as a Service Domains Notifications Be Proactive Bookmark Smart Tech Scary Stories Download Alerts Travel Managing Costs Workforce Hacks SSID Threats Techology Fun Google Maps eCommerce Refrigeration Surveillance Public Speaking Break Fix Virtual Assistant Workplace Strategies Deep Learning Browsers Connectivity Upload Lithium-ion battery Unified Threat Management Virtual Machine Meta Medical IT Entrepreneur Amazon Education Social Network Unified Threat Management Reviews Multi-Factor Security Development Dark Web Transportation IoT Trends Hypervisor Network Congestion Outsource IT Mobile Computing PowerPoint Environment Media Customer Resource management User Error Shopping Search Regulations Optimization Undo Google Calendar Microsoft Excel Employer/Employee Relationships Best Practice Data Analysis Star Wars Buisness Gamification PCI DSS Staff Point of Sale Navigation Small Businesses Displays Legal IT solutions Gig Economy Social Networking Legislation Network Management Internet Service Provider Tech Support Teamwork Business Growth Fileless Malware Content Regulations Compliance Wearable Technology Application Monitors Evernote Outsourcing Comparison Health IT Cortana Motherboard Memes Assessment Net Neutrality IBM Permissions Websites SQL Server Workplace Alt Codes Directions Downtime Financial Data History Hiring/Firing

Blog Archive