Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 27 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade Business Management VoIP Smartphones AI Mobile Devices communications Data Recovery Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Remote Work Managed Service Provider Compliance Outsourced IT Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Mobile Office Two-factor Authentication Apple Employer-Employee Relationship App BYOD Tip of the week Mobile Device Management Chrome Gmail Budget Managed Services Voice over Internet Protocol Networking How To BDR HIPAA Hacker Applications Computing Avoiding Downtime Information Technology Access Control Marketing Office 365 Conferencing WiFi Bring Your Own Device Healthcare Big Data 2FA Router Computers Operating System Virtual Private Network Health Risk Management Website Help Desk Analytics Office Tips Retail Augmented Reality Storage Managed IT Services Password Cooperation Social Patch Management Save Money Remote Monitoring Free Resource End of Support Project Management Vulnerability Vendor Management Windows 11 Going Green Windows 7 Customer Service Physical Security Microsoft 365 Display Excel Cybercrime Solutions Printer Paperless Office Infrastructure Monitoring Document Management Firewall Scam Telephone Data loss The Internet of Things Remote Workers Mouse Entertainment iPhone Administration Robot Vulnerabilities Telephone System Cost Management Customer Relationship Management Images 101 IT Management Multi-Factor Authentication Mobility VPN Settings Meetings Wireless Hacking Supply Chain Printing Content Filtering Presentation Computer Repair YouTube User Tip Modem Wireless Technology Employees Processor Cryptocurrency Mobile Security Integration Virtual Desktop Data storage LiFi Smart Technology Machine Learning Word Holidays Data Privacy Outlook Saving Time Data Storage Maintenance Video Conferencing Money Humor Managed Services Provider Antivirus Managed IT Service Virtual Machines Professional Services Safety Downloads Licensing Sports Social Network Education Multi-Factor Security Alert Net Neutrality Workforce SQL Server Dark Data Threats History IoT Managed IT Dark Web File Sharing Financial Data Application Smartwatch How To IT Workplace Strategies Mobile Computing Trends Customer Resource management Regulations Search Google Calendar Notifications Procurement Meta Azure Amazon Cyber security Data Analysis Best Practice Tech Star Wars IBM Microsoft Excel Travel Telework Staff Google Maps CES Communitications Gamification Techology Buisness IT solutions Social Networking Legislation Supply Chain Management Outsource IT Legal Environment Fileless Malware Media Business Growth Term Unified Threat Management FinTech Wearable Technology IT Assessment Content Unified Threat Management Health IT Motherboard Cortana Competition Comparison Flexibility Small Businesses Value Organization Network Congestion Displays Directions Alt Codes Assessment Permissions Digital Security Cameras Smart Devices User Error Downtime Memory Hosted Solution Specifications Remote Working Outsourcing Data Breach Microchip Typing Google Play Internet Exlporer Fraud Point of Sale User Videos Electronic Health Records Workplace Username Wasting Time Network Management Knowledge Black Friday Tech Support Hiring/Firing Google Drive Monitors Trend Micro Paperless Security Cameras Database IP Address IT Technicians 5G Software as a Service Co-managed IT Managing Costs Proxy Server Unified Communications Cookies Experience Cyber Monday Websites Technology Care Google Docs eCommerce Business Communications Bitcoin SSID Tactics Running Cable Hotspot Recovery Mirgation Hard Drives Electronic Medical Records Surveillance Scams Google Wallet Virtual Assistant SharePoint Virtual Machine Nanotechnology Domains Hybrid Work Reviews Writing Human Resources Windows 8 Medical IT Addiction Lenovo Laptop Language Chatbots Refrigeration Virtual Reality Development Cables Drones Transportation Management Hypervisor Screen Reader Server Management Public Speaking Distributed Denial of Service Private Cloud Shopping Optimization Google Apps PowerPoint Service Level Agreement Superfish Halloween Lithium-ion battery Computing Infrastructure Identity Theft Identity Twitter Entrepreneur IT Maintenance Employer/Employee Relationships Business Intelligence Bookmark Navigation Smart Tech Error PCI DSS Alerts Gig Economy Social Engineering Shortcuts Hacks Download Scary Stories Fun Undo Remote Computing Internet Service Provider Ransmoware Teamwork Vendors Browsers Deep Learning Evernote Connectivity Break Fix Regulations Compliance Tablet Memes Be Proactive Upload

Blog Archive