Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Communication Productivity Saving Money Smartphone Managed Service Data Backup Android Upgrade VoIP Business Management Smartphones AI communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Facebook Automation Artificial Intelligence Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Data Management Business Continuity Government Virtualization Business Technology Wi-Fi Blockchain Bandwidth Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security Gmail Apple BYOD App Employer-Employee Relationship Tip of the week Networking Chrome Budget Managed Services Mobile Device Management Voice over Internet Protocol Applications WiFi Access Control Computing Conferencing Information Technology Hacker Office 365 Avoiding Downtime How To Marketing BDR HIPAA Router Virtual Private Network Big Data Health Help Desk Operating System Risk Management Retail Computers Office Tips Analytics Managed IT Services Website Augmented Reality 2FA Storage Password Bring Your Own Device Healthcare Vendor Management Physical Security The Internet of Things Free Resource Project Management Display Going Green Windows 7 Printer Social Monitoring Paperless Office Infrastructure Microsoft 365 Cybercrime Solutions Document Management Customer Service Telephone Scam Data loss Cooperation Windows 11 Patch Management Remote Workers Save Money Excel Remote Monitoring Firewall End of Support Vulnerability iPhone IT Management Administration Safety VPN Meetings User Tip Vulnerabilities Modem Mobile Security Processor Images 101 Computer Repair Data Privacy Multi-Factor Authentication Mobility Settings Smart Technology Printing Wireless Content Filtering Saving Time YouTube Customer Relationship Management Machine Learning Cryptocurrency Employees Managed IT Service Integration Downloads Hacking Presentation Maintenance Virtual Desktop Licensing Antivirus Data storage LiFi Holidays Wireless Technology Entertainment Data Storage Outlook Video Conferencing Money Humor Managed Services Provider Virtual Machines Telephone System Professional Services Word Supply Chain Cost Management Robot Sports Mouse Smartwatch Entrepreneur IT Mobile Computing Paperless Unified Threat Management Specifications Internet Exlporer Search Fraud Procurement Co-managed IT Microchip Azure Cyber security Best Practice Network Congestion Username Tech Telework Technology Care Black Friday Undo CES Communitications Business Communications Buisness User Error Database Supply Chain Management Legal Scams IT solutions Business Growth Term IT Technicians FinTech Point of Sale Hybrid Work Cyber Monday IT Assessment Human Resources Proxy Server Cookies Tactics Cortana Hotspot Network Management Flexibility Tech Support Cables Value Alt Codes Monitors Mirgation Application Organization Digital Security Cameras Smart Devices Google Apps Downtime Nanotechnology Addiction Language IBM Remote Working Websites IT Maintenance Memory Hosted Solution Business Intelligence Data Breach Typing Management Google Play Chatbots Distributed Denial of Service Videos Electronic Health Records Electronic Medical Records Shortcuts Screen Reader SharePoint Service Level Agreement Knowledge Computing Infrastructure Google Drive Ransmoware Wasting Time Vendors Trend Micro Writing Security Cameras Identity Lenovo Competition Software as a Service Virtual Reality Be Proactive Bookmark Smart Tech 5G Download Experience Alerts Server Management Google Docs Private Cloud Workforce Managing Costs Unified Communications Threats eCommerce Bitcoin SSID Running Cable Superfish Identity Theft Break Fix Surveillance Google Wallet Twitter Workplace Strategies Browsers Virtual Assistant Connectivity Upload User Error Meta Virtual Machine Amazon Windows 8 Social Engineering Social Network Medical IT Laptop Multi-Factor Security Reviews Dark Web Development Drones Remote Computing Transportation IoT Trends IP Address Outsource IT Hypervisor Tablet Environment Optimization Media Customer Resource management PowerPoint Halloween Regulations Google Calendar Shopping Microsoft Excel Alert Data Analysis Employer/Employee Relationships Star Wars Dark Data Gamification Navigation Staff Managed IT Recovery PCI DSS File Sharing Small Businesses Gig Economy Displays Hacks How To Scary Stories Social Networking Legislation Hard Drives Fun Domains Internet Service Provider Notifications Fileless Malware Teamwork Deep Learning Content Evernote Wearable Technology Regulations Compliance Travel Outsourcing Refrigeration Google Maps Memes Health IT Motherboard Techology Comparison Permissions Public Speaking Net Neutrality Workplace Directions SQL Server Education Assessment History Lithium-ion battery Financial Data Unified Threat Management Hiring/Firing

Blog Archive