Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Ransomware Users Managed Service AI Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Training Compliance Covid-19 Gadgets Cloud Computing Server Managed Service Provider IT Support Outsourced IT Remote Work Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Wi-Fi Managed Services Two-factor Authentication Mobile Office Data Security Apps Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Password Managed IT Services How To BDR HIPAA Computing Physical Security Hacker Virtual Private Network Risk Management Website Health Healthcare Help Desk Office Tips Analytics Augmented Reality Retail Storage Bring Your Own Device Big Data Operating System 2FA Computers Router Excel Display Printer Paperless Office Remote Workers Infrastructure Monitoring Firewall Document Management Free Resource Project Management Managed IT Service Windows 7 Telephone The Internet of Things Scam Data loss Microsoft 365 Social Cooperation Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Customer Service Cybercrime Cryptocurrency Video Conferencing Wireless Technology User Tip Modem Managed Services Provider Computer Repair Mobile Security Virtual Machines Professional Services Processor Virtual Desktop Data storage LiFi Word Smart Technology iPhone Outlook Machine Learning Money Saving Time Vulnerabilities Humor Data Privacy Maintenance Images 101 Safety Antivirus Sports Downloads Multi-Factor Authentication Mobility Mouse Licensing Entertainment Administration Employees Integration Telephone System Robot Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Holidays Hacking IT Management Presentation VPN YouTube Meetings Data Storage Supply Chain Username Employer/Employee Relationships Outsourcing Navigation Point of Sale PCI DSS 5G Black Friday Gig Economy Experience Workplace IP Address Google Docs Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Google Wallet Proxy Server Cookies Regulations Compliance Monitors Cyber Monday Hotspot Memes Co-managed IT Recovery Tactics Hard Drives Windows 8 Laptop Websites Mirgation Net Neutrality SQL Server Technology Care History Business Communications Domains Drones Nanotechnology Financial Data Smartwatch Electronic Medical Records Language IT Scams SharePoint Addiction Refrigeration Management Halloween Chatbots Procurement Azure Hybrid Work Cyber security Tech Human Resources Public Speaking Lenovo Screen Reader Telework Writing Distributed Denial of Service CES Virtual Reality Computing Infrastructure Communitications Cables Lithium-ion battery Service Level Agreement Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Supply Chain Management Term Google Apps Superfish Bookmark Identity Theft Smart Tech FinTech Fun Deep Learning Download Twitter Alerts IT Assessment IT Maintenance Undo Error Flexibility Value Business Intelligence Social Engineering Break Fix Shortcuts Browsers Education Connectivity Organization Upload Digital Security Cameras Remote Computing Smart Devices Ransmoware Mobile Computing Social Network Remote Working Multi-Factor Security Memory Vendors Search Dark Web Data Breach Google Play Be Proactive Tablet IoT Application Best Practice Trends Videos Alert Electronic Health Records Workforce Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Wasting Time Threats How To Microsoft Excel Trend Micro Security Cameras Workplace Strategies IBM Legal Data Analysis IT solutions Star Wars Business Growth Gamification Notifications Staff Software as a Service Meta Travel Social Networking Legislation Managing Costs Amazon Cortana eCommerce SSID Techology Fileless Malware Google Maps Alt Codes Content Wearable Technology Surveillance Virtual Assistant Outsource IT Media Competition Health IT Downtime Unified Threat Management Motherboard Comparison Virtual Machine Environment Permissions Medical IT Unified Threat Management Directions Hosted Solution Assessment Reviews Typing Development Transportation Small Businesses Network Congestion Specifications Hypervisor Displays Knowledge Fraud Optimization PowerPoint Google Drive User Error Microchip User Internet Exlporer Shopping

Blog Archive