Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones AI Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Holiday Training Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Employee/Employer Relationship IT Support Encryption Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Managed Services Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Operating System Router Virtual Private Network Risk Management Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Vendor Management Solutions Cybercrime Physical Security Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Content Filtering IT Management Customer Relationship Management Employees VPN YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Processor Presentation Computer Repair Mobile Security Holidays Virtual Desktop Data storage LiFi Wireless Technology Data Storage Supply Chain Smart Technology Outlook Video Conferencing Managed Services Provider Machine Learning Money Saving Time Virtual Machines Professional Services Humor Word Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Data Privacy Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Wireless Printing Videos Unified Threat Management Directions Electronic Health Records Hosted Solution Assessment Workforce Permissions Typing Threats Wasting Time Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Google Drive User Error Microchip Software as a Service Internet Exlporer Competition Meta Knowledge Fraud Managing Costs Amazon Username eCommerce Point of Sale 5G Black Friday SSID Google Docs Surveillance Unified Communications Database Outsource IT Experience Virtual Assistant Virtual Machine Environment Running Cable Tech Support IT Technicians User Media Bitcoin Network Management Reviews Google Wallet Proxy Server Cookies Monitors Cyber Monday Medical IT Development Tactics Small Businesses Hotspot Transportation Hypervisor Displays Laptop Websites Mirgation Windows 8 IP Address Shopping Drones Optimization Nanotechnology PowerPoint SharePoint Addiction Outsourcing Electronic Medical Records Language Employer/Employee Relationships Halloween Chatbots Recovery Navigation PCI DSS Management Gig Economy Lenovo Screen Reader Hard Drives Workplace Writing Distributed Denial of Service Internet Service Provider Service Level Agreement Domains Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Scary Stories Private Cloud Identity Paperless Evernote Regulations Compliance Hacks Server Management Superfish Bookmark Memes Identity Theft Smart Tech Refrigeration Co-managed IT Fun Net Neutrality Deep Learning Download Public Speaking Technology Care Twitter Alerts SQL Server History Error Business Communications Financial Data Lithium-ion battery Smartwatch Browsers IT Education Connectivity Scams Social Engineering Break Fix Entrepreneur Procurement Upload Hybrid Work Remote Computing Azure Cyber security Human Resources Multi-Factor Security Tech Telework Mobile Computing Social Network CES Communitications Tablet IoT Undo Cables Search Dark Web Supply Chain Management Best Practice Trends Alert Buisness File Sharing Regulations Google Apps Dark Data Google Calendar Term FinTech Managed IT Customer Resource management Legal Data Analysis IT Assessment IT solutions Star Wars IT Maintenance How To Microsoft Excel Flexibility Business Growth Gamification Business Intelligence Notifications Staff Value Travel Social Networking Application Shortcuts Legislation Organization Digital Security Cameras Techology Fileless Malware Smart Devices Google Maps Ransmoware Cortana Remote Working Alt Codes Content IBM Vendors Wearable Technology Memory Data Breach Downtime Unified Threat Management Motherboard Be Proactive Comparison Google Play Health IT

Blog Archive