Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 26 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI VoIP Mobile Devices Data Recovery communications Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Information Artificial Intelligence Automation Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Bandwidth Windows 10 Business Technology Apps Vendor Data Security Two-factor Authentication Mobile Office App Employer-Employee Relationship Networking Managed Services Voice over Internet Protocol BYOD Chrome Mobile Device Management Budget Gmail Apple Tip of the week HIPAA Computing Applications How To Information Technology BDR Hacker Avoiding Downtime Office 365 Marketing Conferencing Access Control WiFi Big Data Retail Operating System Router Managed IT Services Risk Management Computers Help Desk Healthcare Website Analytics Office Tips Augmented Reality Virtual Private Network Storage Password Bring Your Own Device Health 2FA Document Management Social Going Green Scam Data loss Cybercrime Customer Service Monitoring Patch Management Remote Workers Save Money Remote Monitoring End of Support Vulnerability Vendor Management Physical Security Free Resource Project Management Display Telephone Printer Firewall Windows 7 Paperless Office Windows 11 Infrastructure Microsoft 365 Cooperation The Internet of Things Solutions Excel Employees Telephone System Cost Management Integration Maintenance Settings Wireless Printing Antivirus Content Filtering Holidays Customer Relationship Management YouTube Data Storage Modem User Tip Processor Cryptocurrency Mobile Security Video Conferencing Data Privacy Hacking Managed Services Provider Presentation Virtual Machines Professional Services Virtual Desktop Robot Data storage Wireless Technology LiFi Smart Technology Outlook iPhone Saving Time IT Management Meetings Money VPN Humor Managed IT Service Word Vulnerabilities Downloads Images 101 Computer Repair Licensing Sports Multi-Factor Authentication Mobility Mouse Entertainment Safety Administration Supply Chain Machine Learning Social Networking Lenovo IT solutions Legislation Trend Micro Writing Workplace Security Cameras Legal Fileless Malware Business Growth Software as a Service Virtual Reality Hiring/Firing Private Cloud Managing Costs Paperless Content Wearable Technology Server Management Application Motherboard Superfish Comparison Identity Theft Cortana eCommerce Co-managed IT SSID Health IT Virtual Assistant Directions Assessment IBM Alt Codes Permissions Surveillance Twitter Technology Care Error Virtual Machine Business Communications Downtime Hosted Solution Reviews Specifications Social Engineering Scams Medical IT Transportation Microchip Internet Exlporer Typing Fraud Development Remote Computing Hybrid Work Hypervisor Human Resources Username Google Drive Competition Shopping Black Friday Tablet Knowledge Optimization Cables PowerPoint Employer/Employee Relationships Database Alert PCI DSS File Sharing 5G Dark Data Google Apps Navigation IT Technicians Managed IT Google Docs Cookies Unified Communications Gig Economy Cyber Monday Experience How To IT Maintenance Proxy Server Teamwork Tactics Bitcoin Hotspot User Running Cable Internet Service Provider Notifications Business Intelligence Regulations Compliance Travel Shortcuts Evernote Google Wallet Mirgation Nanotechnology Techology Google Maps Memes Ransmoware Vendors SQL Server Addiction IP Address Windows 8 Language Laptop Net Neutrality Financial Data Unified Threat Management History Be Proactive Management Drones Chatbots Screen Reader Unified Threat Management Smartwatch Distributed Denial of Service IT Workforce Threats Azure Service Level Agreement Computing Infrastructure Recovery Halloween Procurement Hard Drives Telework Cyber security Network Congestion Workplace Strategies Tech Identity Smart Tech User Error Domains CES Communitications Meta Bookmark Amazon Download Hacks Alerts Scary Stories Supply Chain Management Refrigeration FinTech Point of Sale Fun Term Connectivity Public Speaking Deep Learning Break Fix IT Assessment Outsource IT Browsers Environment Value Media Upload Lithium-ion battery Network Management Flexibility Tech Support Education Organization Multi-Factor Security Entrepreneur Monitors Social Network IoT Digital Security Cameras Dark Web Smart Devices Small Businesses Websites Displays Memory Trends Mobile Computing Remote Working Undo Google Calendar Search Data Breach Google Play Customer Resource management Regulations Data Analysis Star Wars SharePoint Best Practice Videos Microsoft Excel Electronic Health Records Electronic Medical Records Outsourcing Wasting Time Gamification Staff Buisness

Blog Archive