Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 17 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Passwords Saving Money Managed Service Communication Cybersecurity Smartphone Data Backup Android Data Recovery Upgrade AI Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Information Holiday Miscellaneous Artificial Intelligence Automation Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Mobile Office Data Security Two-factor Authentication Vendor Apps Managed Services Voice over Internet Protocol App Networking Mobile Device Management Gmail BYOD WiFi Chrome Employer-Employee Relationship Budget Tip of the week Apple Conferencing Avoiding Downtime Marketing How To BDR Computing Information Technology HIPAA Office 365 Applications Access Control Hacker Retail Healthcare Website Managed IT Services Operating System Risk Management Router Big Data Analytics Office Tips Virtual Private Network Augmented Reality Health Storage 2FA Help Desk Password Bring Your Own Device Computers Remote Workers Telephone Scam Going Green Data loss Cooperation Free Resource Project Management Cybercrime Firewall Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Solutions Physical Security Social Display Printer Paperless Office Windows 11 Infrastructure Monitoring Customer Service Excel Document Management Wireless Technology Managed IT Service Maintenance Antivirus Downloads iPhone Licensing Settings Wireless Entertainment Word Printing Vulnerabilities Data Privacy Content Filtering Images 101 YouTube Telephone System Multi-Factor Authentication Cryptocurrency Robot Mobility Cost Management Safety Virtual Desktop LiFi IT Management Data storage VPN Employees Meetings Integration Outlook User Tip Modem Processor Money Computer Repair Mobile Security Humor Holidays Customer Relationship Management Data Storage Smart Technology Supply Chain Sports Video Conferencing Mouse Machine Learning Managed Services Provider Hacking Presentation Saving Time Virtual Machines Professional Services Administration Server Management Regulations Compliance Private Cloud Identity Best Practice Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Buisness Twitter Alerts SQL Server Technology Care IT solutions IP Address Download Net Neutrality Legal Financial Data Error History Business Growth Business Communications Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Cortana Recovery Upload Procurement Social Network Telework Cyber security Alt Codes Multi-Factor Security Tech Human Resources Hard Drives Domains CES Tablet IoT Communitications Dark Web Cables Downtime Alert Hosted Solution Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Typing Dark Data Google Calendar Term Google Apps Refrigeration Public Speaking Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Knowledge Lithium-ion battery Gamification Flexibility Google Drive Organization Entrepreneur Travel Social Networking Legislation Shortcuts 5G Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Unified Communications Experience Content Remote Working Google Docs Undo Health IT Unified Threat Management Motherboard Data Breach Bitcoin Comparison Google Play Be Proactive Running Cable Unified Threat Management Directions Videos Assessment Electronic Health Records Google Wallet Permissions Workforce Wasting Time Threats Trend Micro Windows 8 Network Congestion Specifications Security Cameras Workplace Strategies Laptop User Error Microchip Internet Exlporer Software as a Service Drones Fraud Meta Managing Costs Amazon Application Username Point of Sale eCommerce Black Friday SSID Halloween IBM Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Network Management Proxy Server Reviews Cookies Hacks Monitors Cyber Monday Medical IT Scary Stories Fun Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Deep Learning Competition Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Education SharePoint Addiction Management PCI DSS Chatbots Navigation Lenovo Gig Economy Screen Reader Mobile Computing Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Search User Service Level Agreement Internet Service Provider

Blog Archive