Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Computer Workplace Tips Hosted Solutions Users Collaboration IT Services Mobile Device Ransomware Quick Tips Microsoft Cybersecurity Workplace Strategy Small Business Passwords Data Backup Communication Smartphone Saving Money Backup Smartphones Android VoIP Business Management Mobile Devices communications Upgrade Data Recovery Managed Service Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Windows Tech Term Remote Network Internet of Things Productivity Artificial Intelligence Automation Facebook Current Events Cloud Computing Covid-19 Gadgets Server Managed Service Provider Remote Work Miscellaneous Outsourced IT Information Holiday Spam AI Employee/Employer Relationship Encryption Windows 10 Compliance Office Government Training Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Apps Data Security Two-factor Authentication Mobile Office Employer-Employee Relationship Networking Vendor Chrome Mobile Device Management Budget Gmail Apple App Managed Services Voice over Internet Protocol Computing How To Information Technology BDR Hacker Avoiding Downtime Office 365 BYOD Marketing Applications Access Control Tip of the week WiFi Conferencing Healthcare Operating System Managed IT Services Risk Management Computers Analytics Website Office Tips IT Support HIPAA Augmented Reality Router Virtual Private Network Storage Password Bring Your Own Device Health Help Desk Big Data Retail Telephone Scam Data loss Cybercrime Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Display Firewall Printer Windows 11 Paperless Office Infrastructure Monitoring 2FA The Internet of Things Excel Document Management Social Going Green Remote Workers Maintenance Settings Wireless Downloads Printing Antivirus Content Filtering iPhone Customer Relationship Management Licensing YouTube Vulnerabilities Entertainment Cryptocurrency Data Privacy Hacking Presentation Images 101 Robot Mobility Telephone System Virtual Desktop Multi-Factor Authentication LiFi Cost Management Wireless Technology Data storage Outlook IT Management Money VPN Employees Meetings Physical Security Integration Word Humor User Tip Modem Computer Repair Mobile Security Processor Sports Mouse Holidays Data Storage Safety Smart Technology Supply Chain Administration Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Managed IT Service Alt Codes Download Net Neutrality IBM Twitter Alerts SQL Server Technology Care Business Communications Financial Data Downtime Error History Hosted Solution Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Typing Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Competition Knowledge Dark Web Cables Google Drive CES Trends Supply Chain Management Alert 5G Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations Unified Communications Star Wars IT Assessment Experience How To Microsoft Excel IT Maintenance Google Docs Data Analysis Bitcoin Gamification Flexibility Running Cable Notifications Staff Value Business Intelligence User Legislation Shortcuts Google Wallet Organization Travel Social Networking Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Windows 8 Content Remote Working IP Address Laptop Wearable Technology Memory Vendors Comparison Google Play Be Proactive Drones Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Halloween Wasting Time Threats Recovery Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Hard Drives Internet Exlporer Software as a Service Domains Fraud Meta User Error Microchip Hacks Username Scary Stories Managing Costs Amazon Fun Black Friday SSID Point of Sale eCommerce Refrigeration Deep Learning Database Surveillance Public Speaking Virtual Assistant Outsource IT Network Management Lithium-ion battery Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Entrepreneur Proxy Server Reviews Education Cookies Tactics Development Hotspot Transportation Small Businesses Mobile Computing Websites Mirgation Hypervisor Displays Undo Search PowerPoint Shopping Nanotechnology Optimization Best Practice Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Buisness Chatbots Navigation Writing Distributed Denial of Service Workplace Legal Lenovo Gig Economy IT solutions Screen Reader Business Growth Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Server Management Regulations Compliance Private Cloud Identity Application Evernote Paperless Identity Theft Smart Tech Memes Cortana Co-managed IT Superfish Bookmark

Blog Archive