Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 12 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Covid-19 Gadgets Cloud Computing Training Server Compliance Managed Service Provider Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Gmail Apple Networking WiFi App BYOD Employer-Employee Relationship Access Control Hacker Conferencing Office 365 Avoiding Downtime Marketing How To BDR HIPAA Applications Computing Information Technology Computers Health Analytics Office Tips Healthcare Website Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Router Big Data Operating System Physical Security 2FA Virtual Private Network Risk Management Help Desk Paperless Office Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Project Management Scam Windows 7 Firewall Data loss Microsoft 365 Solutions The Internet of Things Going Green Patch Management Save Money Social Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Windows 11 Monitoring Display Printer Customer Service Excel Virtual Machines Virtual Desktop Professional Services Presentation Saving Time Data storage LiFi Managed IT Service Wireless Technology Outlook Machine Learning Downloads Money iPhone Humor Licensing Entertainment Vulnerabilities Word Maintenance Data Privacy Sports Antivirus Images 101 Mouse Multi-Factor Authentication Mobility Telephone System Cost Management Administration Safety Robot Employees Integration Settings Modem Wireless User Tip Printing Processor Mobile Security Content Filtering IT Management VPN Holidays YouTube Meetings Customer Relationship Management Data Storage Cryptocurrency Smart Technology Supply Chain Video Conferencing Computer Repair Hacking Managed Services Provider Google Wallet Screen Reader Distributed Denial of Service Workplace Monitors Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing User Laptop Websites Evernote Paperless Regulations Compliance Windows 8 Identity Drones Smart Tech Memes Co-managed IT Bookmark SharePoint Download Net Neutrality Alerts SQL Server Technology Care IP Address Electronic Medical Records Halloween Business Communications Financial Data History Browsers Smartwatch Lenovo Connectivity IT Break Fix Scams Writing Recovery Upload Procurement Azure Hybrid Work Virtual Reality Cyber security Scary Stories Private Cloud Multi-Factor Security Tech Human Resources Hard Drives Social Network Telework Hacks Server Management CES Superfish IoT Communitications Identity Theft Dark Web Cables Domains Fun Trends Supply Chain Management Deep Learning Twitter Regulations Error Google Calendar Term Google Apps Refrigeration Customer Resource management FinTech Data Analysis Star Wars IT Assessment Education Microsoft Excel IT Maintenance Public Speaking Social Engineering Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Remote Computing Social Networking Legislation Shortcuts Entrepreneur Organization Mobile Computing Fileless Malware Digital Security Cameras Smart Devices Tablet Ransmoware Search Content Remote Working Best Practice Wearable Technology Memory Vendors Alert Motherboard Data Breach Buisness File Sharing Comparison Google Play Be Proactive Undo Dark Data Health IT Managed IT Directions Videos Legal Assessment Electronic Health Records IT solutions Permissions Workforce How To Business Growth Wasting Time Threats Notifications Trend Micro Travel Specifications Security Cameras Workplace Strategies Microchip Techology Internet Exlporer Software as a Service Google Maps Fraud Meta Cortana Application Username Alt Codes Managing Costs Amazon eCommerce Downtime Unified Threat Management Black Friday SSID Unified Threat Management Database Surveillance Hosted Solution Virtual Assistant Outsource IT IBM Media Typing IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Network Congestion Proxy Server Reviews Google Drive User Error Tactics Development Hotspot Transportation Small Businesses Knowledge Mirgation Hypervisor Displays Nanotechnology Optimization Point of Sale PowerPoint Competition 5G Shopping Google Docs Addiction Unified Communications Language Employer/Employee Relationships Outsourcing Experience Running Cable Tech Support Navigation Management PCI DSS Bitcoin Network Management Chatbots

Blog Archive