Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 30 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade Smartphones VoIP AI Business Management Mobile Devices Data Recovery communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Automation Information Facebook Artificial Intelligence Gadgets Covid-19 Cloud Computing Holiday Miscellaneous Training Server Managed Service Provider Remote Work Compliance Outsourced IT Spam Encryption Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Government Data Management Business Technology Blockchain Wi-Fi Windows 10 Virtualization Bandwidth Apps Mobile Office Vendor Data Security Two-factor Authentication Employer-Employee Relationship Tip of the week Apple App Networking Mobile Device Management Gmail BYOD Chrome Managed Services Budget Voice over Internet Protocol Access Control Hacker Avoiding Downtime HIPAA Marketing Computing How To Applications BDR Information Technology Office 365 WiFi Conferencing Storage Health Password Healthcare Bring Your Own Device Computers Retail 2FA Website Operating System Managed IT Services Router Risk Management Help Desk Office Tips Analytics Augmented Reality Virtual Private Network Big Data Paperless Office Telephone Infrastructure Free Resource Cooperation Document Management Customer Service Project Management Windows 11 Windows 7 Going Green Microsoft 365 Scam Excel Data loss Solutions Cybercrime Patch Management Firewall Save Money Remote Monitoring Vulnerability End of Support Vendor Management Monitoring The Internet of Things Physical Security Display Social Printer Remote Workers Sports Downloads Mouse iPhone Licensing Customer Relationship Management Machine Learning Entertainment Vulnerabilities Administration Hacking Images 101 Presentation Multi-Factor Authentication Telephone System Mobility Maintenance Antivirus Supply Chain Wireless Technology Cost Management Settings Printing Wireless Content Filtering Employees YouTube Integration Word Cryptocurrency User Tip Modem Mobile Security Processor Robot Holidays Virtual Desktop Data storage LiFi Data Privacy Data Storage Safety IT Management Smart Technology VPN Meetings Video Conferencing Outlook Managed Services Provider Virtual Machines Saving Time Money Professional Services Humor Computer Repair Managed IT Service SQL Server Download Deep Learning Alerts Workforce Net Neutrality IBM Monitors Financial Data History Threats Break Fix Workplace Strategies Smartwatch Websites IT Browsers Connectivity Education Azure Upload Meta Procurement Telework Electronic Medical Records Cyber security Social Network Mobile Computing Tech SharePoint Amazon Multi-Factor Security Dark Web Search CES Communitications Competition IoT Trends Best Practice Lenovo Outsource IT Supply Chain Management Writing FinTech Virtual Reality Customer Resource management Term Regulations Buisness Environment Google Calendar Media Microsoft Excel Server Management Private Cloud IT Assessment Data Analysis Legal Star Wars IT solutions Value Gamification User Business Growth Staff Superfish Small Businesses Identity Theft Flexibility Organization Twitter Social Networking Displays Legislation Cortana Digital Security Cameras Error Smart Devices Fileless Malware Memory Content Alt Codes Wearable Technology Outsourcing Remote Working IP Address Social Engineering Remote Computing Data Breach Health IT Google Play Motherboard Downtime Comparison Permissions Workplace Videos Electronic Health Records Directions Assessment Hosted Solution Wasting Time Recovery Typing Hiring/Firing Tablet Paperless Alert Trend Micro Hard Drives Security Cameras Specifications Fraud Knowledge Managed IT Co-managed IT File Sharing Software as a Service Microchip Domains Google Drive Dark Data Internet Exlporer Managing Costs Username Technology Care How To Business Communications Notifications eCommerce Refrigeration SSID Black Friday 5G Experience Scams Travel Surveillance Public Speaking Google Docs Virtual Assistant Database Unified Communications Virtual Machine Bitcoin IT Technicians Running Cable Techology Hybrid Work Google Maps Lithium-ion battery Human Resources Reviews Proxy Server Google Wallet Medical IT Cookies Entrepreneur Cyber Monday Hotspot Cables Unified Threat Management Development Transportation Tactics Hypervisor Windows 8 Mirgation Laptop Unified Threat Management Google Apps Shopping Optimization Undo Drones PowerPoint Nanotechnology Language IT Maintenance Network Congestion Employer/Employee Relationships Addiction Management Navigation Chatbots Halloween User Error Business Intelligence PCI DSS Shortcuts Gig Economy Screen Reader Distributed Denial of Service Computing Infrastructure Ransmoware Point of Sale Internet Service Provider Teamwork Service Level Agreement Regulations Compliance Application Hacks Evernote Identity Scary Stories Vendors Fun Network Management Be Proactive Tech Support Memes Bookmark Smart Tech

Blog Archive