Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 14 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Email Workplace Tips Computer Google Phishing Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Saving Money AI Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Training Gadgets Compliance Covid-19 Remote Work Managed Service Provider Outsourced IT Server IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Vendor Mobile Office Two-factor Authentication Managed Services Apps Data Security BYOD Mobile Device Management Gmail Tip of the week WiFi Chrome Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking App Marketing Computing Applications Physical Security Information Technology Access Control Office 365 Conferencing Password Managed IT Services How To BDR Hacker Avoiding Downtime HIPAA Router Operating System Website Virtual Private Network Risk Management 2FA Health Help Desk Analytics Office Tips Augmented Reality Big Data Healthcare Retail Storage Bring Your Own Device Computers Vendor Management Cybercrime Display Firewall Windows 11 Printer Monitoring Paperless Office Infrastructure Excel The Internet of Things Document Management Managed IT Service Remote Workers Social Telephone Scam Data loss Cooperation Free Resource Project Management Customer Service Windows 7 Microsoft 365 Going Green Patch Management Save Money Remote Monitoring Solutions End of Support Vulnerability Content Filtering Employees IT Management Integration VPN YouTube Meetings Modem Word User Tip Processor Cryptocurrency Mobile Security Holidays Computer Repair Data Storage Virtual Desktop LiFi Smart Technology Supply Chain Data storage Safety Video Conferencing Managed Services Provider Virtual Machines Professional Services Saving Time Outlook Machine Learning Money Humor Downloads Maintenance iPhone Antivirus Licensing Sports Mouse Entertainment Customer Relationship Management Vulnerabilities Data Privacy Administration Images 101 Hacking Multi-Factor Authentication Mobility Telephone System Presentation Cost Management Robot Wireless Technology Settings Wireless Printing Trend Micro Hosted Solution Specifications Security Cameras Workplace Strategies Unified Threat Management Microchip Internet Exlporer Software as a Service Typing Recovery Fraud Meta Network Congestion Username Hard Drives Managing Costs Amazon eCommerce Black Friday SSID Knowledge Google Drive User Error Domains Database Surveillance Virtual Assistant Outsource IT Media 5G Refrigeration IT Technicians Virtual Machine Environment Point of Sale Public Speaking Cookies Unified Communications Cyber Monday Medical IT Experience Proxy Server Reviews Google Docs Lithium-ion battery Tactics Development Bitcoin Network Management Hotspot Transportation Small Businesses Running Cable Tech Support Entrepreneur Monitors Google Wallet Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Shopping Addiction Windows 8 Language Employer/Employee Relationships Outsourcing Laptop Websites Navigation Management PCI DSS Drones Undo Chatbots Screen Reader Distributed Denial of Service Workplace Electronic Medical Records Gig Economy SharePoint Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Halloween Evernote Paperless Writing Regulations Compliance Lenovo Identity Smart Tech Memes Co-managed IT Virtual Reality Bookmark Download Net Neutrality Hacks Server Management Application Alerts SQL Server Technology Care Scary Stories Private Cloud Identity Theft Business Communications Fun Financial Data Superfish History Browsers Smartwatch IBM Connectivity IT Deep Learning Break Fix Scams Twitter Upload Procurement Azure Hybrid Work Error Cyber security Education Multi-Factor Security Tech Human Resources Social Engineering Social Network Telework CES IoT Communitications Dark Web Cables Remote Computing Trends Supply Chain Management Mobile Computing Regulations Tablet Google Calendar Term Google Apps Search Customer Resource management FinTech Competition Data Analysis Star Wars IT Assessment Best Practice Microsoft Excel IT Maintenance Alert Dark Data Gamification Flexibility Managed IT Staff Value Business Intelligence Buisness File Sharing Social Networking IT solutions Legislation Shortcuts How To Organization Legal Fileless Malware Digital Security Cameras Smart Devices Business Growth User Ransmoware Notifications Content Remote Working Wearable Technology Memory Vendors Travel Motherboard Data Breach Google Maps Comparison Google Play Be Proactive Cortana Health IT Techology Directions Videos IP Address Assessment Electronic Health Records Alt Codes Permissions Workforce Wasting Time Threats Downtime Unified Threat Management

Blog Archive