Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 09 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google Email Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Passwords Quick Tips Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android Data Recovery AI Upgrade Disaster Recovery Business Management Smartphones VoIP Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Artificial Intelligence Automation Facebook Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office App Networking Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Tip of the week Gmail Managed Services Apple Voice over Internet Protocol WiFi How To BDR Computing Information Technology Hacker HIPAA Applications Avoiding Downtime Office 365 Marketing Access Control Conferencing Big Data Managed IT Services Operating System Risk Management Computers Router Virtual Private Network Office Tips Analytics Website Augmented Reality Health 2FA Help Desk Storage Password Bring Your Own Device Retail Healthcare Scam Data loss Going Green Social Cooperation Free Resource Project Management Windows 7 Cybercrime Patch Management Save Money Microsoft 365 Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Firewall Excel Document Management Remote Workers The Internet of Things Telephone iPhone Licensing Entertainment Vulnerabilities Data Privacy Settings Printing Wireless Images 101 Content Filtering Customer Relationship Management Telephone System Multi-Factor Authentication YouTube Robot Mobility Cost Management Cryptocurrency Hacking Presentation IT Management VPN Employees Meetings Virtual Desktop Data storage LiFi Wireless Technology Integration User Tip Modem Processor Outlook Computer Repair Mobile Security Money Holidays Word Humor Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Sports Saving Time Mouse Virtual Machines Professional Services Safety Administration Managed IT Service Maintenance Antivirus Downloads Browsers Smartwatch Legal Connectivity IT IT solutions Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Upload Procurement Business Growth Social Network Telework Cyber security Application Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Dark Web Cables Cortana IBM Alert Trends Supply Chain Management Alt Codes Managed IT Customer Resource management FinTech File Sharing Regulations Downtime Dark Data Google Calendar Term Google Apps Data Analysis Star Wars IT Assessment Hosted Solution How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Gamification Flexibility Typing Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Drive Google Maps Smart Devices Competition Ransmoware Knowledge Wearable Technology Memory Vendors Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive 5G Experience Unified Threat Management Directions Videos Google Docs Assessment Electronic Health Records Unified Communications Permissions Workforce Bitcoin Wasting Time Threats Running Cable User Google Wallet Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Fraud Meta Windows 8 IP Address Managing Costs Amazon Laptop Username Drones Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Network Management Tech Support IT Technicians Virtual Machine Environment Halloween Recovery Media Proxy Server Reviews Cookies Hard Drives Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Domains Hacks Websites Mirgation Hypervisor Displays Scary Stories Shopping Nanotechnology Optimization Refrigeration PowerPoint Fun Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Deep Learning Public Speaking Management PCI DSS Lithium-ion battery Chatbots Navigation Lenovo Gig Economy Screen Reader Education Writing Distributed Denial of Service Workplace Entrepreneur Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Server Management Regulations Compliance Mobile Computing Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Undo Co-managed IT Search Twitter Alerts SQL Server Technology Care Download Net Neutrality Best Practice Financial Data Error History Buisness Business Communications

Blog Archive