Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Efficiency Phishing Privacy Workplace Tips Google Computer Collaboration Hosted Solutions Users IT Services Cybersecurity Ransomware Quick Tips Data Backup Microsoft Communication Small Business Mobile Device Smartphones communications Android Workplace Strategy Business Management Mobile Devices Saving Money Smartphone VoIP Microsoft Office Managed IT Services Data Recovery Managed Service Browser Passwords Social Media Upgrade Backup Disaster Recovery Network Tech Term Internet of Things Automation Cloud Computing Covid-19 Remote Server Managed Service Provider Artificial Intelligence Remote Work Windows Facebook Miscellaneous Gadgets Spam Encryption Information Outsourced IT Holiday Windows 10 Employee/Employer Relationship Data Management Government Business Continuity Wi-Fi Windows 10 Business Technology Productivity Blockchain Data Security Two-factor Authentication Virtualization Bandwidth Apps Compliance Current Events Vendor Managed Services Voice over Internet Protocol Networking Mobile Device Management Gmail Chrome Budget Employer-Employee Relationship Apple App Office Avoiding Downtime Computing Mobile Office Applications Information Technology How To BDR Office 365 Conferencing Access Control Hacker Operating System HIPAA Website Router Marketing Managed IT Services Risk Management Help Desk Office Tips Analytics Augmented Reality BYOD WiFi Big Data Storage Password Virtual Private Network Training Bring Your Own Device Health Computers Retail Cybercrime Scam Data loss Remote Workers Healthcare Firewall Windows 11 Monitoring Patch Management Save Money Free Resource Remote Monitoring End of Support IT Support Project Management Vulnerability Excel Windows 7 The Internet of Things Vendor Management Microsoft 365 Social Display AI Telephone Solutions Printer Paperless Office Infrastructure Cooperation Customer Service Tip of the week Document Management Going Green Video Conferencing Content Filtering Maintenance Managed Services Provider Antivirus Professional Services YouTube Virtual Machines Cryptocurrency Word User Tip Modem Processor Mobile Security iPhone Virtual Desktop Data storage LiFi Robot 2FA Vulnerabilities Smart Technology Supply Chain Safety Outlook Money Images 101 Saving Time IT Management Humor Multi-Factor Authentication VPN Mobility Meetings Managed IT Service Downloads Sports Computer Repair Mouse Licensing Employees Integration Customer Relationship Management Administration Entertainment Data Privacy Machine Learning Hacking Presentation Telephone System Holidays Cost Management Data Storage Settings Wireless Technology Printing Wireless Workforce Assessment Employer/Employee Relationships IP Address Permissions Twitter Hosted Solution Directions Typing PCI DSS Threats Navigation Error Specifications Social Engineering Gig Economy Workplace Strategies Internet Service Provider Meta Knowledge Internet Exlporer Teamwork Fraud Remote Computing Recovery Google Drive Microchip Regulations Compliance Amazon Username Evernote Hard Drives Tablet Domains Black Friday Memes 5G Net Neutrality Outsource IT Experience Database SQL Server Alert Google Docs Unified Communications Dark Data Bitcoin Financial Data Environment Running Cable History Managed IT Media IT Technicians File Sharing Refrigeration Cookies Public Speaking Cyber Monday How To Google Wallet Smartwatch Proxy Server IT Procurement Small Businesses Tactics Azure Lithium-ion battery Hotspot Notifications Entrepreneur Windows 8 Telework Displays Laptop Cyber security Mirgation Tech Travel Nanotechnology Google Maps Drones CES Communitications Techology Supply Chain Management Outsourcing Addiction Language FinTech Halloween Management Chatbots Term Unified Threat Management Undo Screen Reader Distributed Denial of Service IT Assessment Unified Threat Management Workplace Flexibility Hiring/Firing Service Level Agreement Value Computing Infrastructure Network Congestion Hacks Organization Scary Stories Paperless Identity Smart Tech Physical Security Digital Security Cameras Bookmark Smart Devices User Error Co-managed IT Fun Remote Working Technology Care Download Memory Alerts Application Deep Learning Data Breach Business Communications Google Play Point of Sale Connectivity IBM Break Fix Videos Education Browsers Electronic Health Records Scams Hybrid Work Upload Wasting Time Network Management Tech Support Multi-Factor Security Monitors Mobile Computing Social Network Trend Micro Human Resources Security Cameras Search IoT Dark Web Software as a Service Cables Best Practice Trends Managing Costs Websites Competition Google Calendar Buisness Customer Resource management eCommerce Google Apps Regulations SSID Surveillance SharePoint IT Maintenance Star Wars Virtual Assistant Microsoft Excel Electronic Medical Records Legal IT solutions Data Analysis Business Growth Business Intelligence Gamification Virtual Machine Staff Medical IT Legislation Writing Reviews Lenovo Shortcuts Social Networking Development Ransmoware Cortana Transportation Virtual Reality User Fileless Malware Alt Codes Vendors Content Hypervisor Server Management Wearable Technology Private Cloud PowerPoint Identity Theft Comparison Shopping Downtime Health IT Optimization Superfish Be Proactive Motherboard

Blog Archive