Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Ransomware Backup Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery AI Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Information Facebook Holiday Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Server Compliance Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Chrome Budget Networking Mobile Device Management Apple Gmail App BYOD WiFi Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Avoiding Downtime Marketing How To BDR HIPAA Applications Computing Information Technology Access Control Office 365 Conferencing Hacker Augmented Reality Healthcare Storage Website Managed IT Services Password Bring Your Own Device Router Physical Security Operating System Big Data Virtual Private Network Risk Management Health 2FA Help Desk Analytics Computers Office Tips Retail Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Firewall Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Going Green The Internet of Things Display Cybercrime Social Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Customer Service Document Management Remote Workers Maintenance Money Humor Wireless Technology Antivirus Downloads iPhone Licensing Vulnerabilities Entertainment Sports Data Privacy Mouse Word Images 101 Administration Telephone System Multi-Factor Authentication Robot Mobility Cost Management Safety IT Management VPN Employees Settings Meetings Wireless Integration Printing Content Filtering User Tip Modem Computer Repair Mobile Security Processor YouTube Cryptocurrency Holidays Data Storage Smart Technology Supply Chain Customer Relationship Management Virtual Desktop Video Conferencing Data storage LiFi Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Hacking Outlook Presentation Managed IT Service Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Error History Business Communications Social Engineering Break Fix Scams IP Address Hacks Browsers Smartwatch Scary Stories Connectivity IT Upload Procurement Fun Remote Computing Azure Hybrid Work Deep Learning Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Recovery Tablet IoT Communitications Hard Drives Education Trends Supply Chain Management Alert Domains Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Mobile Computing Data Analysis Star Wars IT Assessment Refrigeration Gamification Flexibility Search Notifications Staff Value Business Intelligence Public Speaking Best Practice Organization Travel Social Networking Legislation Shortcuts Ransmoware Lithium-ion battery Techology Fileless Malware Digital Security Cameras Buisness Google Maps Smart Devices IT solutions Content Remote Working Entrepreneur Wearable Technology Memory Vendors Legal Business Growth Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Undo Cortana Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Alt Codes Trend Micro Internet Exlporer Software as a Service Fraud Meta User Error Microchip Downtime Hosted Solution Username Managing Costs Amazon Black Friday SSID Typing Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Application Google Drive Network Management Knowledge Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT IBM Proxy Server Reviews Cookies Tactics Development 5G Hotspot Transportation Small Businesses Google Docs Unified Communications Experience Websites Mirgation Hypervisor Displays PowerPoint Bitcoin Shopping Running Cable Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Google Wallet SharePoint Competition Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Workplace Windows 8 Lenovo Gig Economy Laptop Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Drones Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Superfish Bookmark User Halloween Identity Theft Smart Tech Memes

Blog Archive