Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Automation Facebook Miscellaneous Holiday Training Compliance Covid-19 Cloud Computing Gadgets Server Managed Service Provider Outsourced IT Remote Work IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Blockchain Windows 10 Wi-Fi Virtualization Apps Managed Services Mobile Office Data Security Vendor Two-factor Authentication Employer-Employee Relationship Chrome Budget Voice over Internet Protocol Tip of the week Apple App Mobile Device Management Networking Gmail WiFi BYOD Access Control Conferencing Hacker Avoiding Downtime Marketing Managed IT Services How To BDR Computing HIPAA Information Technology Applications Physical Security Office 365 2FA Analytics Office Tips Help Desk Augmented Reality Health Storage Computers Password Healthcare Bring Your Own Device Retail Website Operating System Router Risk Management Big Data Virtual Private Network Printer Monitoring Paperless Office Excel Infrastructure Customer Service Remote Workers Managed IT Service Document Management Telephone Cooperation Free Resource Scam Project Management Data loss Windows 7 Going Green Firewall Microsoft 365 Cybercrime Solutions Patch Management Save Money The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Social Windows 11 Display Outlook Computer Repair Data Storage Customer Relationship Management Smart Technology Supply Chain Video Conferencing Money Managed Services Provider Humor Saving Time Virtual Machines Professional Services Hacking Presentation Machine Learning Sports Mouse Wireless Technology Downloads iPhone Administration Licensing Maintenance Entertainment Vulnerabilities Antivirus Data Privacy Word Images 101 Multi-Factor Authentication Mobility Settings Telephone System Wireless Cost Management Printing Content Filtering YouTube Robot Safety Cryptocurrency Employees Integration Modem IT Management User Tip Meetings Virtual Desktop Processor Mobile Security VPN Data storage LiFi Holidays Mirgation Hypervisor Displays Shopping Nanotechnology Optimization PowerPoint Network Management Tech Support Halloween Monitors Addiction Language Employer/Employee Relationships Outsourcing Chatbots Competition Navigation Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Hacks Websites Scary Stories Fun Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity SharePoint Evernote Paperless Deep Learning Electronic Medical Records Regulations Compliance Bookmark Smart Tech Memes Co-managed IT User Education Writing Download Net Neutrality Alerts SQL Server Technology Care Lenovo History Business Communications Virtual Reality Financial Data Browsers Smartwatch Connectivity IT IP Address Break Fix Scams Server Management Mobile Computing Private Cloud Identity Theft Search Upload Procurement Azure Hybrid Work Superfish Cyber security Multi-Factor Security Tech Human Resources Best Practice Twitter Social Network Telework CES IoT Communitications Dark Web Cables Recovery Error Buisness IT solutions Social Engineering Trends Supply Chain Management Hard Drives Legal Regulations Domains Google Calendar Term Google Apps Business Growth Remote Computing Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Tablet Cortana Gamification Flexibility Staff Value Business Intelligence Refrigeration Social Networking Public Speaking Legislation Shortcuts Alt Codes Alert Organization File Sharing Downtime Fileless Malware Digital Security Cameras Dark Data Smart Devices Lithium-ion battery Ransmoware Managed IT Entrepreneur Hosted Solution How To Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Typing Notifications Health IT Travel Directions Videos Assessment Electronic Health Records Permissions Workforce Techology Google Drive Google Maps Knowledge Wasting Time Threats Undo Trend Micro Specifications Security Cameras Workplace Strategies Unified Threat Management Microchip 5G Internet Exlporer Software as a Service Fraud Meta Unified Threat Management Google Docs Unified Communications Experience Username Managing Costs Amazon eCommerce Black Friday SSID Bitcoin Running Cable Network Congestion Database Surveillance Virtual Assistant Outsource IT Application Google Wallet User Error Media IT Technicians Virtual Machine Environment Cookies IBM Cyber Monday Medical IT Windows 8 Laptop Proxy Server Reviews Point of Sale Tactics Development Hotspot Transportation Small Businesses Drones

Blog Archive