Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Passwords Quick Tips AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Training Covid-19 Gadgets Cloud Computing Managed Service Provider Remote Work Outsourced IT Server IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Blockchain Bandwidth Virtualization Wi-Fi Two-factor Authentication Vendor Apps Data Security Managed Services Mobile Office Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Apple Networking Employer-Employee Relationship App BYOD Voice over Internet Protocol Access Control Office 365 HIPAA Applications Managed IT Services How To BDR Hacker Conferencing Avoiding Downtime Computing Physical Security Marketing Information Technology Health Office Tips Analytics Augmented Reality Retail Router Storage Password Big Data Bring Your Own Device 2FA Help Desk Computers Operating System Healthcare Website Virtual Private Network Risk Management Printer Paperless Office Cooperation Free Resource Project Management Infrastructure Windows 7 Firewall Microsoft 365 Document Management Solutions The Internet of Things Social Scam Data loss Windows 11 Monitoring Going Green Patch Management Customer Service Save Money Excel Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Managed IT Service Remote Workers Telephone Display Computer Repair Entertainment Vulnerabilities Word Virtual Desktop Data Privacy Data storage LiFi Images 101 Multi-Factor Authentication Mobility Outlook Telephone System Cost Management Machine Learning Money Safety Humor Employees Maintenance Antivirus Sports Integration Mouse Modem User Tip Processor Mobile Security Administration Holidays Customer Relationship Management Data Storage Smart Technology Supply Chain Video Conferencing Robot Hacking Managed Services Provider Virtual Machines Settings Professional Services Presentation Saving Time Printing Wireless Content Filtering IT Management Wireless Technology VPN YouTube Meetings Downloads Cryptocurrency iPhone Licensing Cyber security Experience Multi-Factor Security Tech Human Resources Hard Drives Google Docs Social Network Telework Unified Communications CES Bitcoin Network Management IoT Communitications Running Cable Tech Support Dark Web Cables Domains Google Wallet Trends Supply Chain Management Monitors Regulations Google Calendar Term Google Apps Refrigeration Customer Resource management FinTech Data Analysis Windows 8 Star Wars IT Assessment Laptop Websites Microsoft Excel IT Maintenance Public Speaking Drones Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Social Networking Electronic Medical Records Legislation Shortcuts Entrepreneur SharePoint Organization Fileless Malware Digital Security Cameras Smart Devices Halloween Ransmoware Lenovo Content Remote Working Wearable Technology Memory Vendors Writing Motherboard Data Breach Virtual Reality Comparison Google Play Be Proactive Undo Health IT Directions Videos Hacks Server Management Assessment Electronic Health Records Scary Stories Private Cloud Permissions Workforce Superfish Identity Theft Wasting Time Threats Fun Trend Micro Twitter Specifications Security Cameras Workplace Strategies Deep Learning Microchip Internet Exlporer Software as a Service Error Fraud Meta Application Username Education Managing Costs Amazon Social Engineering eCommerce Remote Computing Black Friday SSID Mobile Computing Database Surveillance Virtual Assistant Outsource IT IBM Media Tablet IT Technicians Virtual Machine Environment Search Best Practice Cookies Alert Cyber Monday Medical IT Proxy Server Reviews Managed IT Tactics Development Buisness File Sharing Hotspot Transportation Small Businesses Dark Data How To Legal IT solutions Mirgation Hypervisor Displays Business Growth Nanotechnology Optimization Notifications PowerPoint Competition Shopping Addiction Travel Language Employer/Employee Relationships Outsourcing Cortana Navigation Techology Management PCI DSS Google Maps Chatbots Alt Codes Screen Reader Distributed Denial of Service Workplace Gig Economy Service Level Agreement Internet Service Provider Downtime Unified Threat Management Computing Infrastructure Teamwork Hiring/Firing User Evernote Paperless Unified Threat Management Regulations Compliance Hosted Solution Identity Typing Smart Tech Memes Co-managed IT Bookmark Download Net Neutrality Alerts SQL Server Technology Care IP Address Network Congestion Knowledge Business Communications Google Drive User Error Financial Data History Browsers Smartwatch Connectivity IT Break Fix Scams Recovery Upload Procurement Point of Sale Azure Hybrid Work 5G

Blog Archive