Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You’ll Be Surprised at the Art That Has Been Made Using Excel

You’ll Be Surprised at the Art That Has Been Made Using Excel

Defining art can be a challenging task, particularly in light of the constantly evolving techniques and mediums. At its core, art can be succinctly described as the creative expression of an individual using some form of medium.

Japanese artist Tatsuo Horiuchi provides a unique illustration of this concept, utilizing a medium that is familiar to both art enthusiasts and outsiders. His artistry takes a very literal and unconventional path, however. Instead of traditional materials like clay or paint, he crafts his artwork using the cells within a Microsoft Excel spreadsheet.

Tatsuo Horiuchi's journey into this distinctive art form began after retiring from his career as a medical equipment engineer. Seeking a creative outlet but lacking the conventional art supplies and the inclination to invest in them, he turned to a readily available tool: Excel. Although he had never used the software for artistic purposes, Tatsuo embarked on a journey of self-education, exploring the software's features and discovering how to employ various tools to achieve different artistic effects. He repurposed the autoshape feature for the overall design, transformed the graph-focused line tool into trees, and utilized the fill tool to create shading that added depth to his paintings.

Over the years, through diligent self-learning, Tatsuo's artistic process evolved. Starting in 2000 with the aspiration to create artwork worth sharing within a decade, his initial years were dedicated to mastering Excel's tools to create recognizable shapes and objects. The subsequent three years saw him combining these elements into coherent images. In 2006, his talents earned him recognition when he won the Excel Autoshape Art Contest.

Since then, Tatsuo's art has graced the walls of prestigious institutions like the Gunma Museum of Art, sharing this honor with renowned artists such as Monet and Renoir. View some of his works here

This story conveys an important message that technology can be harnessed in various innovative ways. While it might not turn your team into award-winning artists, it can significantly enhance your business operations and ensure compliance with regulations.

At Voyage Technology, our expert team has been assisting businesses in Western Kentucky with their IT needs. We are ready to help you make the most of technology to improve your processes. To learn more about our managed IT services and how they can benefit your business, give us a call today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Computer Phishing Workplace Tips IT Services Collaboration Users Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Communication Passwords Data Backup Smartphone Saving Money Backup Managed Service VoIP Business Management Smartphones Android communications Mobile Devices Upgrade Disaster Recovery Data Recovery Browser Social Media Windows Managed IT Services Microsoft Office Current Events Network Tech Term Remote Productivity Internet of Things Facebook Artificial Intelligence Automation Gadgets Cloud Computing AI Covid-19 Miscellaneous Server Managed Service Provider Remote Work Outsourced IT Holiday Information Employee/Employer Relationship Encryption Spam Compliance Training Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication IT Support Mobile Office Vendor Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Chrome Budget Mobile Device Management Gmail Apple WiFi How To Conferencing BDR Computing Information Technology Hacker Office 365 Avoiding Downtime Access Control HIPAA Marketing Tip of the week Applications Help Desk Managed IT Services Big Data Operating System Healthcare Risk Management Computers Virtual Private Network Analytics Office Tips Health Augmented Reality Website Router Storage Password Bring Your Own Device Retail Monitoring Scam Data loss The Internet of Things Going Green Social Patch Management Telephone Cybercrime Save Money Remote Monitoring Remote Workers Vulnerability End of Support Vendor Management Cooperation Customer Service Physical Security Display Printer Free Resource Project Management Paperless Office Windows 11 Windows 7 Infrastructure 2FA Microsoft 365 Excel Document Management Solutions Firewall Safety Smart Technology Holidays Saving Time Data Storage Data Privacy Settings Video Conferencing Printing Managed IT Service Wireless Managed Services Provider Content Filtering Virtual Machines Professional Services Robot Downloads YouTube Licensing Customer Relationship Management Cryptocurrency Entertainment IT Management VPN Meetings iPhone Hacking Presentation Virtual Desktop LiFi Vulnerabilities Data storage Telephone System Computer Repair Wireless Technology Cost Management Images 101 Outlook Multi-Factor Authentication Mobility Money Supply Chain Humor Machine Learning Word User Tip Modem Sports Mobile Security Processor Mouse Employees Integration Maintenance Administration Antivirus Best Practice Mirgation Surveillance Scams Virtual Assistant Social Engineering Undo Nanotechnology Buisness Hybrid Work Virtual Machine Remote Computing Language Human Resources Medical IT Legal Addiction IT solutions Reviews Management Business Growth Chatbots Development Tablet Cables Transportation Screen Reader Distributed Denial of Service Hypervisor Alert Computing Infrastructure Cortana Optimization File Sharing Google Apps PowerPoint Dark Data Service Level Agreement Shopping Managed IT Alt Codes Identity IT Maintenance Employer/Employee Relationships How To Application Navigation Bookmark Smart Tech Downtime PCI DSS Business Intelligence Notifications Alerts Travel Shortcuts IBM Download Hosted Solution Gig Economy Typing Techology Internet Service Provider Google Maps Ransmoware Teamwork Evernote Browsers Connectivity Regulations Compliance Vendors Break Fix Knowledge Memes Unified Threat Management Be Proactive Google Drive Upload Social Network Unified Threat Management Net Neutrality Workforce Multi-Factor Security SQL Server History Competition IoT Financial Data Threats Dark Web 5G Smartwatch Experience IT Workplace Strategies Network Congestion Google Docs Trends Unified Communications Customer Resource management Bitcoin User Error Regulations Running Cable Procurement Meta Google Calendar Azure Cyber security Tech Data Analysis Google Wallet Star Wars Telework Amazon Microsoft Excel CES Staff Communitications Point of Sale User Gamification Windows 8 Social Networking Laptop Supply Chain Management Outsource IT Legislation Tech Support Media Term Fileless Malware Drones FinTech Network Management Environment Wearable Technology IT Assessment IP Address Monitors Content Health IT Motherboard Halloween Flexibility Small Businesses Comparison Value Websites Directions Assessment Organization Displays Permissions Digital Security Cameras Smart Devices Recovery Hacks SharePoint Scary Stories Remote Working Outsourcing Specifications Memory Electronic Medical Records Hard Drives Fun Data Breach Domains Google Play Microchip Internet Exlporer Fraud Username Deep Learning Videos Lenovo Electronic Health Records Workplace Writing Hiring/Firing Black Friday Wasting Time Virtual Reality Refrigeration Trend Micro Private Cloud Paperless Public Speaking Security Cameras Database Education Server Management Superfish IT Technicians Software as a Service Identity Theft Co-managed IT Lithium-ion battery Entrepreneur Proxy Server Mobile Computing Cookies Technology Care Cyber Monday Managing Costs Twitter Hotspot Search eCommerce Error Business Communications SSID Tactics

Blog Archive