Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 07 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Managed Services Voice over Internet Protocol Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Virtual Private Network Risk Management Website 2FA Health Help Desk Analytics Office Tips Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Free Resource Project Management Social Cooperation Windows 7 Microsoft 365 Going Green Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Physical Security Display Windows 11 Printer Paperless Office Infrastructure Monitoring Excel Money Saving Time Humor Managed IT Service iPhone Safety Maintenance Antivirus Sports Downloads Mouse Licensing Vulnerabilities Data Privacy Entertainment Administration Images 101 Mobility Multi-Factor Authentication Telephone System Robot Customer Relationship Management Cost Management Settings Printing Wireless Employees Content Filtering Integration Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Holidays Virtual Desktop Data Storage Supply Chain Data storage LiFi Video Conferencing Word Smart Technology Managed Services Provider Professional Services Outlook Virtual Machines Machine Learning Public Speaking Lenovo Screen Reader Regulations Compliance Writing Distributed Denial of Service Evernote Paperless Co-managed IT Lithium-ion battery Service Level Agreement Virtual Reality Computing Infrastructure Memes Entrepreneur Scary Stories Private Cloud Identity Net Neutrality SQL Server Technology Care Hacks Server Management Superfish Bookmark Identity Theft Smart Tech Financial Data Fun History Business Communications IT Scams Deep Learning Download Smartwatch Twitter Alerts Error Procurement Azure Hybrid Work Undo Tech Human Resources Browsers Education Connectivity Telework Social Engineering Break Fix Cyber security Remote Computing Communitications Cables Upload CES Mobile Computing Social Network Supply Chain Management Multi-Factor Security Term Google Apps Tablet IoT FinTech Search Dark Web Alert IT Assessment IT Maintenance Application Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Flexibility Dark Data Google Calendar Value Business Intelligence Shortcuts IBM Legal Data Analysis IT solutions Star Wars Organization How To Microsoft Excel Notifications Staff Smart Devices Ransmoware Business Growth Gamification Digital Security Cameras Travel Social Networking Remote Working Legislation Memory Vendors Google Play Be Proactive Techology Fileless Malware Google Maps Cortana Data Breach Wearable Technology Electronic Health Records Workforce Alt Codes Content Videos Competition Health IT Downtime Unified Threat Management Motherboard Comparison Wasting Time Threats Security Cameras Workplace Strategies Unified Threat Management Directions Hosted Solution Assessment Permissions Trend Micro Software as a Service Meta Typing Network Congestion Specifications Managing Costs Amazon SSID Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud eCommerce Surveillance Virtual Assistant Outsource IT Username Point of Sale 5G Black Friday Virtual Machine Environment Media Medical IT IP Address Google Docs Unified Communications Database Reviews Experience Running Cable Tech Support IT Technicians Development Transportation Small Businesses Bitcoin Network Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Hypervisor Displays PowerPoint Recovery Tactics Shopping Hotspot Optimization Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Hard Drives Windows 8 Domains Drones Nanotechnology PCI DSS Navigation Workplace SharePoint Addiction Gig Economy Electronic Medical Records Language Halloween Chatbots Internet Service Provider Teamwork Hiring/Firing Refrigeration Management

Blog Archive