Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 18 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet IT Support Malware Privacy Computer Google Email Workplace Tips Phishing IT Services Hosted Solutions Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Backup Cybersecurity Passwords Saving Money Communication Data Backup Smartphone Managed Service Android Business Management Smartphones VoIP communications Mobile Devices Upgrade Disaster Recovery Data Recovery Browser Windows Social Media Productivity Managed IT Services Microsoft Office AI Current Events Remote Tech Term Network Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Gadgets Information Remote Work Training Miscellaneous Server Managed Service Provider Outsourced IT Employee/Employer Relationship Spam Compliance Encryption Windows 10 Office Government Data Management Business Continuity Wi-Fi Windows 10 Virtualization IT Support Business Technology Bandwidth Blockchain Vendor Two-factor Authentication Apps Mobile Office Data Security Gmail BYOD Chrome Employer-Employee Relationship Budget Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management Computing HIPAA Information Technology Applications WiFi Office 365 Access Control Tip of the week Conferencing Hacker Avoiding Downtime How To Marketing BDR Risk Management Router Virtual Private Network Big Data Analytics Office Tips Health 2FA Augmented Reality Help Desk Storage Password Retail Bring Your Own Device Computers Healthcare Managed IT Services Website Operating System Firewall Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security The Internet of Things Display Printer Paperless Office Windows 11 Social Infrastructure Monitoring Excel Document Management Customer Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Going Green Project Management Windows 7 Patch Management Save Money Microsoft 365 Cybercrime YouTube Cryptocurrency IT Management Meetings Safety VPN Employees Integration Virtual Desktop Modem Data storage LiFi User Tip Processor Computer Repair Mobile Security Holidays Outlook Data Storage Money Humor Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Customer Relationship Management Virtual Machines Professional Services Saving Time Sports Mouse Managed IT Service Hacking Maintenance Presentation Downloads Administration Antivirus iPhone Licensing Wireless Technology Entertainment Vulnerabilities Data Privacy Images 101 Settings Word Wireless Printing Multi-Factor Authentication Robot Mobility Content Filtering Telephone System Cost Management Content Remote Working Wearable Technology Memory Vendors Public Speaking Unified Threat Management Motherboard Data Breach Lithium-ion battery Google Drive Comparison Google Play Be Proactive Knowledge Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Entrepreneur 5G Wasting Time Threats Trend Micro Google Docs Network Congestion Specifications Security Cameras Workplace Strategies Unified Communications Experience User Error Microchip Internet Exlporer Software as a Service Fraud Meta Undo Bitcoin Running Cable Username Managing Costs Amazon Google Wallet Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Windows 8 Laptop Media Network Management Tech Support IT Technicians Virtual Machine Environment Drones Cookies Monitors Cyber Monday Medical IT Application Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Halloween Websites Mirgation Hypervisor Displays IBM Nanotechnology Optimization PowerPoint Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hacks Scary Stories Navigation Fun Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Deep Learning Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Competition Evernote Paperless Education Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Mobile Computing Business Communications User Search Financial Data Error History Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Best Practice Buisness Upload Procurement Remote Computing Azure Hybrid Work Cyber security IP Address Legal Multi-Factor Security Tech Human Resources IT solutions Social Network Telework CES Tablet IoT Communitications Dark Web Cables Business Growth Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Recovery Cortana Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Hard Drives Alt Codes Downtime Gamification Flexibility Notifications Staff Value Business Intelligence Domains Travel Social Networking Legislation Shortcuts Hosted Solution Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Refrigeration Typing

Blog Archive