Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 26 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade Business Management Smartphones VoIP AI Mobile Devices communications Data Recovery Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Information Automation Artificial Intelligence Facebook Cloud Computing Miscellaneous Gadgets Holiday Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Encryption Employee/Employer Relationship IT Support Windows 10 Office Government Business Continuity Data Management Virtualization Blockchain Business Technology Wi-Fi Windows 10 Bandwidth Apps Vendor Mobile Office Two-factor Authentication Data Security BYOD Apple Employer-Employee Relationship App Tip of the week Mobile Device Management Managed Services Voice over Internet Protocol Networking Gmail Chrome Budget HIPAA Access Control Hacker Applications Computing Avoiding Downtime Information Technology Marketing Office 365 How To Conferencing BDR WiFi Storage Big Data Password Bring Your Own Device Virtual Private Network Health Computers Router Operating System 2FA Website Retail Risk Management Help Desk Managed IT Services Analytics Office Tips Healthcare Augmented Reality Free Resource Remote Monitoring End of Support Project Management Vulnerability Windows 7 Social Vendor Management Cooperation Microsoft 365 Physical Security Display Solutions Printer Going Green Customer Service Paperless Office Infrastructure Windows 11 Cybercrime Document Management Excel Monitoring Scam Data loss Firewall Remote Workers Telephone The Internet of Things Patch Management Save Money Sports Entertainment Mouse Images 101 IT Management Multi-Factor Authentication VPN Mobility Meetings Administration Telephone System Cost Management Customer Relationship Management Computer Repair Employees Integration Hacking Settings Presentation Printing Wireless Content Filtering Wireless Technology User Tip Machine Learning Modem Supply Chain YouTube Mobile Security Holidays Processor Data Storage Cryptocurrency Maintenance Video Conferencing Smart Technology Managed Services Provider Word Antivirus Virtual Desktop Virtual Machines Professional Services Data storage LiFi Saving Time Outlook Managed IT Service iPhone Money Data Privacy Safety Humor Downloads Robot Vulnerabilities Licensing Supply Chain Management Social Network Deep Learning Shortcuts Multi-Factor Security Ransmoware Dark Web FinTech Term Unified Threat Management IoT Trends Vendors Education IT Assessment Application Unified Threat Management Flexibility Value Customer Resource management Regulations Be Proactive Google Calendar Star Wars Network Congestion Workforce Microsoft Excel Organization IBM Data Analysis Mobile Computing Gamification Threats Staff Digital Security Cameras Search Smart Devices User Error Legislation Remote Working Memory Best Practice Social Networking Workplace Strategies Meta Buisness Data Breach Fileless Malware Google Play Point of Sale Legal Content Amazon IT solutions Wearable Technology Videos Electronic Health Records Comparison Competition Wasting Time Network Management Health IT Tech Support Business Growth Motherboard Assessment Monitors Outsource IT Permissions Trend Micro Directions Security Cameras Environment Media Cortana Software as a Service Specifications Managing Costs Websites Alt Codes Internet Exlporer Small Businesses Downtime Fraud eCommerce User Microchip SSID Virtual Assistant Username Electronic Medical Records Displays Hosted Solution Surveillance SharePoint Black Friday Virtual Machine Typing Database Writing Outsourcing Reviews IP Address Lenovo Medical IT Transportation Google Drive Virtual Reality IT Technicians Knowledge Development Workplace Cyber Monday Hypervisor Server Management Proxy Server Private Cloud Cookies Tactics Hiring/Firing Hotspot Shopping 5G Optimization Recovery Superfish PowerPoint Identity Theft Employer/Employee Relationships Google Docs Twitter Unified Communications Mirgation Paperless Experience Hard Drives Co-managed IT Running Cable PCI DSS Domains Navigation Error Bitcoin Nanotechnology Google Wallet Addiction Social Engineering Technology Care Language Gig Economy Internet Service Provider Refrigeration Teamwork Management Remote Computing Chatbots Business Communications Scams Laptop Distributed Denial of Service Regulations Compliance Public Speaking Evernote Windows 8 Screen Reader Tablet Drones Service Level Agreement Hybrid Work Computing Infrastructure Lithium-ion battery Memes Net Neutrality SQL Server Entrepreneur Alert Identity Human Resources Dark Data Cables Halloween Financial Data History Managed IT Bookmark File Sharing Smart Tech Download How To Alerts Smartwatch IT Procurement Undo Azure Notifications Google Apps IT Maintenance Scary Stories Break Fix Telework Cyber security Browsers Tech Travel Hacks Connectivity Google Maps Upload Business Intelligence CES Fun Communitications Techology

Blog Archive