Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips AI Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Facebook Automation Miscellaneous Artificial Intelligence Holiday Gadgets Compliance Cloud Computing Covid-19 Training Outsourced IT Server Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Virtualization Wi-Fi Business Technology Bandwidth Blockchain Windows 10 Apps Managed Services Two-factor Authentication Data Security Mobile Office Vendor WiFi Tip of the week Employer-Employee Relationship Voice over Internet Protocol Chrome Networking Budget Apple Mobile Device Management BYOD App Gmail Access Control Computing Information Technology Conferencing Office 365 Managed IT Services Hacker How To Avoiding Downtime BDR Marketing HIPAA Physical Security Applications Operating System Health 2FA Big Data Help Desk Risk Management Retail Healthcare Office Tips Analytics Computers Augmented Reality Storage Password Website Bring Your Own Device Router Virtual Private Network Windows 11 The Internet of Things Paperless Office Infrastructure Cybercrime Monitoring Social Excel Document Management Managed IT Service Remote Workers Telephone Customer Service Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Going Green Display Printer Content Filtering Holidays Data Storage YouTube Smart Technology Supply Chain Video Conferencing Cryptocurrency Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Virtual Desktop Customer Relationship Management Data storage LiFi Maintenance Antivirus Downloads iPhone Outlook Hacking Licensing Presentation Money Vulnerabilities Entertainment Humor Data Privacy Wireless Technology Images 101 Sports Telephone System Mouse Multi-Factor Authentication Robot Mobility Cost Management Word Administration IT Management VPN Employees Meetings Integration User Tip Modem Computer Repair Mobile Security Settings Safety Processor Printing Wireless Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Hosted Solution Tactics Development Typing Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays PowerPoint Knowledge Shopping Google Drive Nanotechnology Optimization Application Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Chatbots Navigation 5G Writing Distributed Denial of Service Workplace Experience IBM Lenovo Gig Economy Google Docs Screen Reader Unified Communications Service Level Agreement Internet Service Provider Bitcoin Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Running Cable Server Management Regulations Compliance Google Wallet Private Cloud Identity Evernote Paperless Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Windows 8 Twitter Alerts SQL Server Technology Care Laptop Competition Financial Data Drones Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Halloween Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES User Tablet IoT Communitications Trends Supply Chain Management Hacks Alert Scary Stories Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Fun Deep Learning How To Microsoft Excel IT Maintenance IP Address Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Education Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Recovery Google Maps Smart Devices Hard Drives Content Remote Working Mobile Computing Wearable Technology Memory Vendors Search Domains Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Best Practice Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Refrigeration Wasting Time Threats Buisness Public Speaking Legal Trend Micro IT solutions Network Congestion Specifications Security Cameras Workplace Strategies Business Growth Fraud Meta Lithium-ion battery User Error Microchip Internet Exlporer Software as a Service Username Entrepreneur Managing Costs Amazon Cortana Point of Sale eCommerce Black Friday SSID Database Surveillance Alt Codes Virtual Assistant Outsource IT Undo Network Management Tech Support IT Technicians Virtual Machine Environment Downtime Media

Blog Archive