Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Hosted Solutions Collaboration Users Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Cybersecurity Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android VoIP Business Management Smartphones communications Upgrade Mobile Devices Managed Service Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Productivity Artificial Intelligence Automation Facebook Current Events Cloud Computing Covid-19 Gadgets Server Remote Work Managed Service Provider Miscellaneous AI Information Holiday Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Compliance Government Training Business Continuity Data Management Wi-Fi Blockchain Windows 10 Business Technology Bandwidth Virtualization Two-factor Authentication Mobile Office Apps Data Security BYOD Vendor Mobile Device Management Chrome Budget Gmail Managed Services Voice over Internet Protocol Apple App Networking Employer-Employee Relationship Computing Hacker Information Technology Avoiding Downtime Applications Office 365 Marketing IT Support Access Control Tip of the week Conferencing WiFi How To BDR Computers Risk Management HIPAA Router Website Virtual Private Network Analytics Office Tips Augmented Reality Health Help Desk Storage Password Bring Your Own Device Retail Big Data Healthcare Managed IT Services Operating System Customer Service Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security Display Printer Paperless Office Windows 11 Infrastructure 2FA Firewall Monitoring Excel Document Management The Internet of Things Remote Workers Telephone Social Scam Data loss Going Green Cooperation Free Resource Project Management Windows 7 Cybercrime Robot Mobility Telephone System YouTube Multi-Factor Authentication Cost Management Hacking Cryptocurrency Presentation IT Management Wireless Technology VPN Employees Virtual Desktop Meetings LiFi Integration Data storage User Tip Modem Processor Computer Repair Mobile Security Outlook Word Holidays Money Humor Data Storage Smart Technology Supply Chain Video Conferencing Sports Machine Learning Managed Services Provider Virtual Machines Safety Professional Services Mouse Saving Time Managed IT Service Administration Maintenance Downloads Antivirus iPhone Licensing Vulnerabilities Entertainment Settings Data Privacy Wireless Customer Relationship Management Printing Content Filtering Images 101 Legislation Shortcuts Organization Travel Social Networking Google Maps Smart Devices Knowledge Ransmoware Google Drive Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors 5G Comparison Google Play Be Proactive User Health IT Unified Threat Management Motherboard Data Breach Unified Communications Assessment Electronic Health Records Experience Permissions Workforce Google Docs Unified Threat Management Directions Videos Bitcoin Running Cable Wasting Time Threats IP Address Network Congestion Specifications Security Cameras Workplace Strategies Google Wallet Trend Micro Internet Exlporer Software as a Service Fraud Meta User Error Microchip Windows 8 Username Laptop Managing Costs Amazon Black Friday SSID Recovery Drones Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Hard Drives Network Management Halloween Tech Support IT Technicians Virtual Machine Environment Domains Media Cookies Monitors Cyber Monday Medical IT Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Refrigeration Hacks Scary Stories Websites Mirgation Hypervisor Displays Public Speaking Nanotechnology Optimization Fun Lithium-ion battery PowerPoint Shopping SharePoint Deep Learning Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Entrepreneur Navigation Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Education Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Undo Evernote Paperless Mobile Computing Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Search Co-managed IT Superfish Bookmark Best Practice Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Buisness Error History IT solutions Connectivity IT Social Engineering Break Fix Scams Application Legal Browsers Smartwatch Business Growth Upload Procurement Remote Computing Azure Hybrid Work IBM Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Cortana Dark Web Cables CES Alt Codes Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Downtime File Sharing Regulations Hosted Solution Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Typing Gamification Flexibility Notifications Staff Value Business Intelligence Competition

Blog Archive