Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 15 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Computer Google Email Workplace Tips Phishing Hosted Solutions Workplace Strategy Collaboration Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security App Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Gmail Budget WiFi Networking Apple Managed Services Voice over Internet Protocol Computing Hacker Information Technology Avoiding Downtime Access Control Marketing HIPAA Office 365 Applications How To BDR Conferencing Healthcare Operating System Computers Virtual Private Network Risk Management Health Website Router Analytics Office Tips 2FA Augmented Reality Retail Storage Help Desk Password Bring Your Own Device Managed IT Services Big Data Patch Management Telephone Save Money Remote Monitoring Going Green Vulnerability End of Support Vendor Management Cooperation Free Resource Customer Service Physical Security Project Management Cybercrime Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Windows 11 Document Management Firewall Excel Scam Monitoring Data loss The Internet of Things Social Remote Workers Robot Downloads iPhone Data Privacy Licensing Customer Relationship Management Settings IT Management Entertainment Wireless Vulnerabilities Printing VPN Meetings Content Filtering Hacking YouTube Images 101 Presentation Computer Repair Multi-Factor Authentication Mobility Cryptocurrency Telephone System Cost Management Wireless Technology Virtual Desktop Data storage LiFi Employees Word Machine Learning Integration Outlook Modem User Tip Processor Mobile Security Money Humor Supply Chain Holidays Maintenance Antivirus Safety Data Storage Smart Technology Sports Mouse Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Administration Managed IT Service Legal IT solutions Human Resources Travel Download Net Neutrality Alerts SQL Server IBM History Techology Business Growth Cables Google Maps Financial Data Browsers Smartwatch Connectivity IT Break Fix Google Apps Unified Threat Management Cortana Upload Procurement Azure Cyber security Multi-Factor Security Tech Unified Threat Management Alt Codes IT Maintenance Social Network Telework Downtime CES IoT Communitications Dark Web Competition Business Intelligence Hosted Solution Shortcuts Trends Supply Chain Management Network Congestion Regulations Google Calendar Term User Error Typing Ransmoware Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel Vendors Google Drive User Be Proactive Point of Sale Knowledge Gamification Flexibility Staff Value Social Networking Legislation Workforce Organization Threats Network Management Fileless Malware Digital Security Cameras Tech Support 5G Smart Devices Google Docs Unified Communications Workplace Strategies Experience Content Remote Working Monitors Wearable Technology Memory IP Address Motherboard Data Breach Comparison Google Play Bitcoin Meta Running Cable Health IT Amazon Directions Videos Websites Assessment Electronic Health Records Permissions Google Wallet Recovery Wasting Time Electronic Medical Records Trend Micro Specifications Security Cameras Hard Drives SharePoint Windows 8 Outsource IT Laptop Environment Microchip Media Internet Exlporer Software as a Service Fraud Domains Drones Lenovo Username Writing Managing Costs Virtual Reality eCommerce Black Friday SSID Refrigeration Small Businesses Halloween Displays Server Management Private Cloud Database Surveillance Virtual Assistant Public Speaking Lithium-ion battery Superfish Identity Theft IT Technicians Virtual Machine Proxy Server Reviews Twitter Cookies Cyber Monday Medical IT Hacks Entrepreneur Outsourcing Scary Stories Error Fun Tactics Development Hotspot Transportation Mirgation Hypervisor Deep Learning Workplace Social Engineering Shopping Remote Computing Nanotechnology Optimization PowerPoint Undo Hiring/Firing Education Paperless Addiction Language Employer/Employee Relationships Chatbots Navigation Co-managed IT Tablet Management PCI DSS Gig Economy Alert Screen Reader Distributed Denial of Service Mobile Computing Technology Care Managed IT Business Communications File Sharing Search Service Level Agreement Internet Service Provider Dark Data Computing Infrastructure Teamwork Identity Evernote Application Best Practice Scams Regulations Compliance How To Buisness Bookmark Notifications Smart Tech Memes Hybrid Work

Blog Archive