Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Mouse Can Do More Than You Think

Your Mouse Can Do More Than You Think

You’ve used a mouse for years, but do you know of all the neat little tricks that it’s capable of? We’ll show you just how much you can get done with your mouse.

Continue reading
0 Comments

Tip of the Week: How to Change Your Mouse Pointer in Windows 10

b2ap3_thumbnail_mouse_pointers_400.jpgThe mouse is a critical part of navigating your workstation. Without it, you’d struggle to open applications, move around Office documents, create images, and countless other functions. Just like many other features in Windows 10, you can customize how your mouse pointer looks and functions, making it much easier to maneuver around your system.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Facebook Automation Miscellaneous Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Compliance Managed Service Provider Remote Work Outsourced IT Server IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Apps Data Security BYOD Mobile Device Management Gmail WiFi Tip of the week Chrome Budget Employer-Employee Relationship Managed Services Voice over Internet Protocol Apple Networking App Marketing Computing HIPAA Information Technology Applications Access Control Office 365 Conferencing How To Hacker BDR Avoiding Downtime Website Operating System Physical Security Virtual Private Network Risk Management Router Health Analytics Office Tips Big Data 2FA Augmented Reality Help Desk Retail Storage Password Bring Your Own Device Healthcare Managed IT Services Computers Windows 7 Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Microsoft 365 Firewall Solutions Display Printer Paperless Office Infrastructure The Internet of Things Windows 11 Social Document Management Monitoring Excel Scam Remote Workers Managed IT Service Data loss Customer Service Telephone Cooperation Free Resource Going Green Patch Management Project Management Save Money Settings Images 101 Printing Wireless Telephone System Multi-Factor Authentication Mobility Content Filtering Cost Management Word IT Management VPN YouTube Meetings Cryptocurrency Employees Computer Repair Integration Virtual Desktop Safety User Tip Modem Data storage LiFi Processor Mobile Security Holidays Outlook Machine Learning Money Data Storage Humor Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Maintenance Antivirus Sports Customer Relationship Management Mouse Hacking Downloads Administration Presentation iPhone Licensing Entertainment Wireless Technology Vulnerabilities Data Privacy Robot Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Alt Codes Staff Value Business Intelligence Downtime Unified Threat Management Gamification Flexibility Recovery Organization Hard Drives Social Networking Unified Threat Management Legislation Shortcuts Hosted Solution Fileless Malware Digital Security Cameras Domains Smart Devices Ransmoware Typing Wearable Technology Memory Vendors Network Congestion Content Remote Working Health IT Refrigeration Motherboard Data Breach Google Drive User Error Comparison Google Play Be Proactive Knowledge Directions Videos Public Speaking Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Point of Sale 5G Lithium-ion battery Trend Micro Google Docs Entrepreneur Specifications Security Cameras Workplace Strategies Unified Communications Experience Running Cable Tech Support Microchip Internet Exlporer Software as a Service Fraud Meta Bitcoin Network Management Managing Costs Amazon Google Wallet Monitors Username Undo eCommerce Black Friday SSID Laptop Websites Database Surveillance Virtual Assistant Outsource IT Windows 8 IT Technicians Virtual Machine Environment Drones Media Proxy Server Reviews Cookies SharePoint Cyber Monday Medical IT Electronic Medical Records Halloween Tactics Development Hotspot Transportation Small Businesses Application Mirgation Hypervisor Displays Lenovo Writing Shopping Nanotechnology Optimization PowerPoint Virtual Reality Hacks Server Management Scary Stories Private Cloud IBM Addiction Language Employer/Employee Relationships Outsourcing Chatbots Superfish Navigation Identity Theft Fun Management PCI DSS Twitter Gig Economy Screen Reader Distributed Denial of Service Workplace Deep Learning Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Education Social Engineering Regulations Compliance Remote Computing Bookmark Competition Smart Tech Memes Co-managed IT Mobile Computing Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Tablet Search Financial Data Alert Browsers Smartwatch Connectivity IT Break Fix Scams Best Practice Managed IT Buisness File Sharing Dark Data Upload Procurement User Azure Hybrid Work Social Network Telework Cyber security Legal Multi-Factor Security Tech Human Resources IT solutions How To Notifications CES IoT Communitications Dark Web Cables Business Growth Travel IP Address Trends Supply Chain Management Customer Resource management FinTech Regulations Techology Google Calendar Term Google Apps Google Maps Cortana

Blog Archive