Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 30 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Communication Cybersecurity Productivity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Vendor Two-factor Authentication Apps Mobile Office Data Security Gmail BYOD Employer-Employee Relationship Chrome Tip of the week Budget Apple Networking App Mobile Device Management Managed Services Voice over Internet Protocol Computing Applications Information Technology WiFi Access Control Office 365 Conferencing Hacker Avoiding Downtime How To Marketing BDR HIPAA Router Healthcare Risk Management Virtual Private Network Big Data Health Help Desk Office Tips 2FA Analytics Augmented Reality Storage Password Retail Computers Bring Your Own Device Managed IT Services Website Operating System Vendor Management Physical Security The Internet of Things Display Printer Free Resource Project Management Social Paperless Office Windows 7 Windows 11 Monitoring Infrastructure Microsoft 365 Excel Document Management Solutions Customer Service Telephone Scam Data loss Cooperation Going Green Patch Management Save Money Remote Monitoring Firewall Remote Workers Vulnerability Cybercrime End of Support YouTube IT Management Cryptocurrency VPN Meetings iPhone Safety User Tip Modem Processor Mobile Security Vulnerabilities Computer Repair Virtual Desktop Data storage LiFi Images 101 Smart Technology Multi-Factor Authentication Mobility Outlook Supply Chain Saving Time Money Machine Learning Customer Relationship Management Humor Managed IT Service Employees Hacking Downloads Sports Integration Presentation Mouse Maintenance Antivirus Licensing Entertainment Wireless Technology Administration Holidays Data Privacy Data Storage Video Conferencing Telephone System Managed Services Provider Cost Management Word Settings Virtual Machines Professional Services Robot Printing Wireless Content Filtering Specifications Unified Threat Management Entrepreneur Net Neutrality SQL Server Workforce Knowledge History Threats Microchip Internet Exlporer Google Drive Fraud Financial Data Smartwatch IT Workplace Strategies Network Congestion Username Undo Black Friday User Error Procurement 5G Azure Meta Experience Cyber security Amazon Tech Database Google Docs Unified Communications Telework IT Technicians Bitcoin CES Running Cable Communitications Point of Sale Proxy Server Cookies Google Wallet Cyber Monday Supply Chain Management Outsource IT Network Management Environment Tech Support Term Media Tactics Hotspot FinTech Mirgation Application Windows 8 Laptop IT Assessment Monitors Nanotechnology Drones Flexibility Value Small Businesses Displays Websites Addiction IBM Language Organization Chatbots Digital Security Cameras Halloween Smart Devices Management Electronic Medical Records Screen Reader Distributed Denial of Service SharePoint Remote Working Memory Outsourcing Data Breach Google Play Service Level Agreement Computing Infrastructure Identity Hacks Videos Lenovo Scary Stories Electronic Health Records Workplace Writing Hiring/Firing Virtual Reality Bookmark Smart Tech Competition Fun Wasting Time Server Management Trend Micro Private Cloud Security Cameras Paperless Download Alerts Deep Learning Superfish Software as a Service Identity Theft Co-managed IT Technology Care Twitter Browsers Connectivity Break Fix Education Managing Costs eCommerce Error SSID Business Communications Upload User Mobile Computing Multi-Factor Security Surveillance Virtual Assistant Scams Social Engineering Social Network Hybrid Work Remote Computing IoT Dark Web Search Virtual Machine Reviews Medical IT Human Resources Trends IP Address Best Practice Regulations Google Calendar Buisness Development Tablet Transportation Cables Customer Resource management Hypervisor Alert Data Analysis Star Wars Legal Microsoft Excel IT solutions Recovery Business Growth Shopping Managed IT Optimization File Sharing PowerPoint Google Apps Dark Data Gamification Staff Social Networking Hard Drives Legislation Employer/Employee Relationships IT Maintenance How To Cortana Business Intelligence Notifications Fileless Malware Navigation Domains PCI DSS Alt Codes Gig Economy Travel Shortcuts Content Wearable Technology Motherboard Refrigeration Comparison Techology Downtime Internet Service Provider Google Maps Teamwork Ransmoware Health IT Vendors Directions Evernote Assessment Public Speaking Permissions Hosted Solution Regulations Compliance Typing Memes Unified Threat Management Be Proactive Lithium-ion battery

Blog Archive