Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 24 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Managed Service Smartphone Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Facebook Information Automation Artificial Intelligence Cloud Computing Miscellaneous Holiday Gadgets Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Windows 10 Office Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Apps Two-factor Authentication Vendor Mobile Office Data Security BYOD Employer-Employee Relationship Chrome Tip of the week Budget Apple Mobile Device Management Networking App Gmail Managed Services Voice over Internet Protocol WiFi Computing Information Technology HIPAA Access Control Office 365 Applications Hacker Avoiding Downtime Marketing Conferencing How To BDR Operating System Healthcare Big Data Risk Management Virtual Private Network Router Health Office Tips Analytics Computers Augmented Reality 2FA Storage Password Help Desk Retail Website Bring Your Own Device Managed IT Services Cooperation Remote Monitoring The Internet of Things Cybercrime Vulnerability End of Support Vendor Management Social Physical Security Free Resource Project Management Display Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Customer Service Windows 11 Solutions Document Management Monitoring Excel Scam Data loss Firewall Telephone Going Green Patch Management Save Money Remote Workers Content Filtering iPhone YouTube IT Management Cryptocurrency Telephone System VPN Meetings Vulnerabilities Cost Management Computer Repair Virtual Desktop Images 101 Customer Relationship Management Data storage LiFi Multi-Factor Authentication Mobility Outlook Hacking User Tip Modem Presentation Money Processor Mobile Security Machine Learning Humor Employees Supply Chain Integration Wireless Technology Sports Smart Technology Mouse Maintenance Antivirus Saving Time Holidays Word Administration Data Storage Managed IT Service Video Conferencing Downloads Managed Services Provider Professional Services Virtual Machines Licensing Settings Data Privacy Safety Robot Printing Entertainment Wireless Net Neutrality IT Maintenance SQL Server Hosted Solution Trends Typing Customer Resource management Regulations Financial Data Business Intelligence Google Calendar Unified Threat Management History Shortcuts Data Analysis Star Wars Unified Threat Management Smartwatch Microsoft Excel IT Knowledge Staff Procurement Ransmoware Azure Google Drive Gamification Social Networking Telework Vendors Legislation Cyber security Network Congestion Tech Application Be Proactive Fileless Malware User Error CES 5G Communitications Experience Wearable Technology Supply Chain Management Workforce IBM Google Docs Unified Communications Content Bitcoin Health IT Running Cable Motherboard FinTech Threats Comparison Point of Sale Term Workplace Strategies Google Wallet Directions Assessment Permissions IT Assessment Network Management Flexibility Meta Tech Support Value Windows 8 Laptop Organization Amazon Specifications Monitors Smart Devices Competition Drones Microchip Internet Exlporer Digital Security Cameras Fraud Remote Working Outsource IT Websites Memory Username Google Play Halloween Environment Black Friday Data Breach Media Electronic Health Records Electronic Medical Records Database SharePoint Videos IT Technicians Small Businesses Wasting Time User Security Cameras Hacks Proxy Server Scary Stories Cookies Lenovo Displays Cyber Monday Trend Micro Writing Software as a Service Virtual Reality Tactics Fun Hotspot Mirgation Server Management Outsourcing Private Cloud Managing Costs IP Address Deep Learning SSID Nanotechnology Superfish Identity Theft eCommerce Surveillance Workplace Twitter Virtual Assistant Education Addiction Language Chatbots Hiring/Firing Error Virtual Machine Recovery Management Medical IT Hard Drives Mobile Computing Screen Reader Reviews Distributed Denial of Service Paperless Social Engineering Development Co-managed IT Remote Computing Transportation Domains Service Level Agreement Search Computing Infrastructure Identity Technology Care Hypervisor Best Practice PowerPoint Refrigeration Bookmark Buisness Smart Tech Shopping Tablet Optimization Business Communications Alerts Scams Alert Employer/Employee Relationships Public Speaking Legal IT solutions Download Managed IT PCI DSS Hybrid Work File Sharing Lithium-ion battery Dark Data Navigation Business Growth How To Browsers Entrepreneur Connectivity Gig Economy Break Fix Human Resources Internet Service Provider Cables Notifications Teamwork Upload Cortana Alt Codes Social Network Regulations Compliance Multi-Factor Security Travel Evernote Google Apps Undo Downtime IoT Techology Dark Web Google Maps Memes

Blog Archive