Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You’ll Be Surprised at the Art That Has Been Made Using Excel

You’ll Be Surprised at the Art That Has Been Made Using Excel

Defining art can be a challenging task, particularly in light of the constantly evolving techniques and mediums. At its core, art can be succinctly described as the creative expression of an individual using some form of medium.

Japanese artist Tatsuo Horiuchi provides a unique illustration of this concept, utilizing a medium that is familiar to both art enthusiasts and outsiders. His artistry takes a very literal and unconventional path, however. Instead of traditional materials like clay or paint, he crafts his artwork using the cells within a Microsoft Excel spreadsheet.

Tatsuo Horiuchi's journey into this distinctive art form began after retiring from his career as a medical equipment engineer. Seeking a creative outlet but lacking the conventional art supplies and the inclination to invest in them, he turned to a readily available tool: Excel. Although he had never used the software for artistic purposes, Tatsuo embarked on a journey of self-education, exploring the software's features and discovering how to employ various tools to achieve different artistic effects. He repurposed the autoshape feature for the overall design, transformed the graph-focused line tool into trees, and utilized the fill tool to create shading that added depth to his paintings.

Over the years, through diligent self-learning, Tatsuo's artistic process evolved. Starting in 2000 with the aspiration to create artwork worth sharing within a decade, his initial years were dedicated to mastering Excel's tools to create recognizable shapes and objects. The subsequent three years saw him combining these elements into coherent images. In 2006, his talents earned him recognition when he won the Excel Autoshape Art Contest.

Since then, Tatsuo's art has graced the walls of prestigious institutions like the Gunma Museum of Art, sharing this honor with renowned artists such as Monet and Renoir. View some of his works here

This story conveys an important message that technology can be harnessed in various innovative ways. While it might not turn your team into award-winning artists, it can significantly enhance your business operations and ensure compliance with regulations.

At Voyage Technology, our expert team has been assisting businesses in Western Kentucky with their IT needs. We are ready to help you make the most of technology to improve your processes. To learn more about our managed IT services and how they can benefit your business, give us a call today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 16 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Miscellaneous Holiday Automation Compliance Covid-19 Gadgets Cloud Computing Training Managed Service Provider Outsourced IT Remote Work Server IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Vendor Data Security Apps Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Marketing How To HIPAA BDR Applications Computing Information Technology Hacker Conferencing Access Control Avoiding Downtime Office 365 Office Tips Analytics Website Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Router Big Data Operating System 2FA Help Desk Physical Security Virtual Private Network Risk Management Computers Health Healthcare Document Management Cooperation Free Resource Project Management Firewall Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Cybercrime Monitoring Customer Service Excel Display Printer Paperless Office Remote Workers Infrastructure Managed IT Service Telephone Outlook iPhone Licensing Machine Learning Money Word Entertainment Humor Vulnerabilities Data Privacy Images 101 Maintenance Antivirus Sports Telephone System Mouse Multi-Factor Authentication Mobility Cost Management Safety Administration Employees Integration Robot User Tip Modem Mobile Security Settings Processor Printing Wireless Holidays Content Filtering Customer Relationship Management IT Management Data Storage VPN YouTube Meetings Smart Technology Supply Chain Video Conferencing Cryptocurrency Managed Services Provider Hacking Saving Time Virtual Machines Presentation Professional Services Computer Repair Virtual Desktop Data storage LiFi Wireless Technology Downloads Electronic Medical Records Browsers Smartwatch SharePoint Connectivity IT Break Fix Scams Azure Hybrid Work Halloween Recovery Upload Procurement Social Network Telework Lenovo Cyber security Hard Drives Multi-Factor Security Tech Human Resources Writing Virtual Reality CES IoT Communitications Domains Dark Web Cables Hacks Server Management Scary Stories Private Cloud Trends Supply Chain Management Customer Resource management FinTech Superfish Regulations Identity Theft Refrigeration Google Calendar Term Google Apps Fun Twitter Data Analysis Star Wars IT Assessment Deep Learning Public Speaking Microsoft Excel IT Maintenance Lithium-ion battery Staff Value Business Intelligence Error Gamification Flexibility Organization Social Networking Education Legislation Shortcuts Social Engineering Entrepreneur Remote Computing Fileless Malware Digital Security Cameras Smart Devices Ransmoware Mobile Computing Wearable Technology Memory Vendors Content Remote Working Health IT Motherboard Data Breach Tablet Undo Comparison Google Play Be Proactive Search Alert Directions Videos Assessment Electronic Health Records Best Practice Permissions Workforce Managed IT Wasting Time Threats Buisness File Sharing Dark Data Legal Trend Micro IT solutions Specifications Security Cameras Workplace Strategies How To Notifications Microchip Internet Exlporer Software as a Service Business Growth Fraud Meta Username Managing Costs Amazon Travel Application Techology eCommerce Google Maps Black Friday SSID Cortana IBM Virtual Assistant Outsource IT Database Surveillance Alt Codes IT Technicians Virtual Machine Environment Downtime Unified Threat Management Media Proxy Server Reviews Unified Threat Management Cookies Hosted Solution Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Typing Mirgation Hypervisor Displays Network Congestion Shopping Google Drive User Error Nanotechnology Optimization Competition PowerPoint Knowledge Language Employer/Employee Relationships Outsourcing Addiction Management PCI DSS Chatbots Point of Sale Navigation 5G Gig Economy Google Docs Screen Reader Unified Communications Distributed Denial of Service Workplace Experience Bitcoin Network Management Computing Infrastructure Teamwork Hiring/Firing Running Cable Tech Support User Service Level Agreement Internet Service Provider Regulations Compliance Google Wallet Identity Evernote Paperless Monitors Bookmark Smart Tech Memes Co-managed IT Windows 8 IP Address Alerts SQL Server Technology Care Laptop Websites Download Net Neutrality Financial Data Drones History Business Communications

Blog Archive