Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 18 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Phishing Privacy Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Gadgets Cloud Computing Training Compliance Covid-19 Outsourced IT Remote Work Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Government Business Continuity Virtualization Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Data Security Managed Services Apps Two-factor Authentication Mobile Office Vendor Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Applications Managed IT Services How To BDR Conferencing Computing Physical Security Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Password Bring Your Own Device 2FA Help Desk Big Data Operating System Healthcare Risk Management Virtual Private Network Computers Health Analytics Website Office Tips Augmented Reality Retail Storage Router Scam Data loss The Internet of Things Windows 11 Monitoring Social Going Green Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Cybercrime Managed IT Service Telephone Customer Service Display Printer Paperless Office Cooperation Free Resource Infrastructure Project Management Windows 7 Microsoft 365 Document Management Solutions Firewall Mouse User Tip Modem Processor Safety Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Robot Video Conferencing Managed Services Provider Saving Time Virtual Machines Settings Professional Services Wireless Printing Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Downloads Cryptocurrency iPhone Licensing Hacking Presentation Computer Repair Entertainment Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Wireless Technology Images 101 Outlook Telephone System Multi-Factor Authentication Mobility Cost Management Machine Learning Money Humor Word Employees Maintenance Antivirus Sports Integration Education Managing Costs Amazon Social Engineering Entrepreneur Username eCommerce Remote Computing Black Friday SSID Mobile Computing Database Surveillance Virtual Assistant Outsource IT Tablet IT Technicians Virtual Machine Environment Undo Search Media Proxy Server Reviews Best Practice Cookies Alert Cyber Monday Medical IT Dark Data Managed IT Tactics Development Buisness File Sharing Hotspot Transportation Small Businesses IT solutions Mirgation Hypervisor Displays How To Legal Shopping Business Growth Nanotechnology Optimization Notifications PowerPoint Application Addiction Travel Language Employer/Employee Relationships Outsourcing Management PCI DSS Google Maps Chatbots Cortana Navigation Techology Gig Economy Alt Codes Screen Reader IBM Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Downtime Unified Threat Management Regulations Compliance Hosted Solution Identity Evernote Paperless Unified Threat Management Bookmark Typing Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Network Congestion Download Net Neutrality Google Drive User Error Financial Data History Competition Knowledge Business Communications Browsers Smartwatch Connectivity IT Break Fix Scams Point of Sale Azure Hybrid Work 5G Upload Procurement Google Docs Social Network Telework Unified Communications Cyber security Experience Multi-Factor Security Tech Human Resources CES Bitcoin Network Management IoT Communitications Running Cable Tech Support Dark Web Cables User Monitors Google Wallet Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Data Analysis Windows 8 Star Wars IT Assessment IP Address Laptop Websites Microsoft Excel IT Maintenance Staff Value Business Intelligence Drones Gamification Flexibility SharePoint Organization Social Networking Electronic Medical Records Legislation Shortcuts Fileless Malware Digital Security Cameras Smart Devices Halloween Ransmoware Recovery Wearable Technology Memory Vendors Hard Drives Writing Lenovo Content Remote Working Health IT Motherboard Data Breach Domains Virtual Reality Comparison Google Play Be Proactive Directions Videos Hacks Server Management Assessment Electronic Health Records Scary Stories Private Cloud Permissions Workforce Identity Theft Wasting Time Threats Refrigeration Fun Superfish Deep Learning Trend Micro Public Speaking Twitter Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Lithium-ion battery Error Fraud Meta

Blog Archive