Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 17 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Workplace Tips IT Services Privacy Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery AI Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Information Miscellaneous Artificial Intelligence Holiday Automation Gadgets Cloud Computing Training Covid-19 Remote Work Server Compliance Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Data Management Government Business Continuity Windows 10 Blockchain Wi-Fi Virtualization Bandwidth Business Technology Vendor Two-factor Authentication Apps Data Security Mobile Office Tip of the week Gmail WiFi Networking Employer-Employee Relationship Managed Services Voice over Internet Protocol Chrome Budget BYOD Apple App Mobile Device Management Computing HIPAA Information Technology Applications How To Office 365 BDR Hacker Conferencing Avoiding Downtime Marketing Access Control 2FA Operating System Retail Risk Management Router Big Data Managed IT Services Analytics Office Tips Augmented Reality Help Desk Healthcare Computers Storage Password Bring Your Own Device Physical Security Virtual Private Network Website Health Firewall Document Management Excel Cybercrime The Internet of Things Scam Data loss Social Remote Workers Monitoring Patch Management Save Money Customer Service Remote Monitoring End of Support Vulnerability Vendor Management Free Resource Project Management Windows 7 Display Telephone Printer Microsoft 365 Paperless Office Infrastructure Solutions Windows 11 Cooperation Going Green Employees Settings Integration Wireless Supply Chain Printing Machine Learning Telephone System Content Filtering Cost Management YouTube Safety Maintenance Cryptocurrency Holidays Antivirus Data Storage Video Conferencing Virtual Desktop Data storage LiFi User Tip Managed Services Provider Modem Professional Services Mobile Security Processor Virtual Machines Outlook Data Privacy Customer Relationship Management Robot Money Smart Technology Humor iPhone Hacking Saving Time Presentation Vulnerabilities IT Management Sports VPN Mouse Meetings Managed IT Service Wireless Technology Images 101 Administration Downloads Computer Repair Multi-Factor Authentication Mobility Licensing Word Entertainment SharePoint Microsoft Excel Alt Codes Electronic Medical Records Data Analysis Trend Micro Displays Star Wars Public Speaking Security Cameras Software as a Service Downtime Gamification Lithium-ion battery Staff Hosted Solution Writing Managing Costs Outsourcing Social Networking Lenovo Legislation Entrepreneur SSID Typing Virtual Reality Fileless Malware eCommerce Surveillance Content Virtual Assistant Workplace Wearable Technology Server Management Private Cloud Google Drive Identity Theft Health IT Virtual Machine Knowledge Hiring/Firing Motherboard Undo Superfish Comparison Medical IT Paperless Permissions Reviews Twitter Directions Assessment Development Transportation 5G Co-managed IT Error Google Docs Unified Communications Social Engineering Hypervisor Experience Technology Care Specifications PowerPoint Business Communications Fraud Shopping Bitcoin Remote Computing Microchip Optimization Running Cable Internet Exlporer Username Employer/Employee Relationships Scams Application Google Wallet Tablet PCI DSS Hybrid Work Navigation Black Friday Database IBM Human Resources Gig Economy Windows 8 Alert Laptop Internet Service Provider Dark Data Teamwork Cables IT Technicians Managed IT Drones File Sharing Cyber Monday Regulations Compliance How To Proxy Server Cookies Evernote Tactics Google Apps Hotspot Notifications Memes Halloween Net Neutrality SQL Server IT Maintenance Mirgation Travel Google Maps Financial Data History Business Intelligence Nanotechnology Competition Techology Addiction Shortcuts Language Smartwatch Hacks IT Scary Stories Procurement Management Azure Fun Ransmoware Chatbots Unified Threat Management Distributed Denial of Service Telework Deep Learning Cyber security Vendors Screen Reader Tech Unified Threat Management Service Level Agreement Be Proactive Computing Infrastructure User CES Communitications Supply Chain Management Education Network Congestion Workforce Identity User Error FinTech Bookmark Threats Smart Tech Term Download IP Address Workplace Strategies Alerts Mobile Computing IT Assessment Point of Sale Flexibility Value Search Meta Break Fix Organization Best Practice Browsers Amazon Connectivity Upload Recovery Network Management Digital Security Cameras Tech Support Smart Devices Buisness Remote Working IT solutions Monitors Social Network Memory Outsource IT Hard Drives Multi-Factor Security Legal Media Dark Web Business Growth Data Breach Environment IoT Domains Google Play Trends Videos Websites Electronic Health Records Customer Resource management Wasting Time Cortana Small Businesses Regulations Refrigeration Google Calendar

Blog Archive