Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 29 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management Smartphones AI Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Facebook Automation Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Managed Service Provider Remote Work Server Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Government Business Continuity Data Management Bandwidth Windows 10 Virtualization Blockchain Business Technology Wi-Fi Apps Vendor Two-factor Authentication Data Security Mobile Office Chrome Mobile Device Management Budget BYOD Gmail Managed Services Voice over Internet Protocol Apple App Tip of the week Employer-Employee Relationship Networking Conferencing WiFi Access Control HIPAA Computing Applications Information Technology Hacker How To Avoiding Downtime Office 365 BDR Marketing Augmented Reality Storage Password Bring Your Own Device Healthcare Virtual Private Network Big Data Health Operating System Router Retail Risk Management Computers 2FA Managed IT Services Help Desk Analytics Website Office Tips Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Firewall Telephone Physical Security Remote Workers Display Printer The Internet of Things Cooperation Paperless Office Infrastructure Social Free Resource Going Green Project Management Windows 7 Document Management Microsoft 365 Cybercrime Solutions Customer Service Windows 11 Scam Data loss Monitoring Excel Robot Data Storage Saving Time Money Humor Word Video Conferencing Managed IT Service Managed Services Provider Virtual Machines Professional Services Downloads IT Management Sports Meetings VPN Mouse Licensing Safety Data Privacy Administration Entertainment iPhone Computer Repair Vulnerabilities Telephone System Cost Management Settings Images 101 Wireless Printing Machine Learning Mobility Content Filtering Multi-Factor Authentication Customer Relationship Management YouTube Maintenance Cryptocurrency Hacking Antivirus User Tip Modem Presentation Mobile Security Employees Processor Integration Virtual Desktop Data storage LiFi Wireless Technology Supply Chain Smart Technology Outlook Holidays Screen Reader Hard Drives Distributed Denial of Service Paperless Hypervisor Travel Optimization Techology PowerPoint Google Maps Service Level Agreement Domains Computing Infrastructure Co-managed IT Shopping Employer/Employee Relationships Hacks Identity Scary Stories Technology Care Navigation Unified Threat Management Smart Tech Refrigeration Fun Business Communications PCI DSS Bookmark Unified Threat Management Download Deep Learning Public Speaking Alerts Scams Gig Economy Internet Service Provider Teamwork Lithium-ion battery Hybrid Work Evernote Connectivity Education Network Congestion Break Fix Entrepreneur Human Resources Regulations Compliance Browsers Memes User Error Upload Cables Multi-Factor Security Net Neutrality SQL Server Social Network Mobile Computing Point of Sale IoT Undo Dark Web Search Google Apps Financial Data History IT Trends Best Practice IT Maintenance Smartwatch Google Calendar Procurement Azure Network Management Customer Resource management Tech Support Regulations Buisness Business Intelligence Tech Star Wars IT solutions Monitors Microsoft Excel Shortcuts Telework Cyber security Data Analysis Legal Communitications Gamification Business Growth Staff Ransmoware CES Legislation Supply Chain Management Websites Social Networking Application Vendors Term Cortana Be Proactive FinTech Fileless Malware IT Assessment SharePoint Content Alt Codes IBM Electronic Medical Records Wearable Technology Workforce Threats Comparison Flexibility Value Health IT Motherboard Downtime Assessment Hosted Solution Writing Permissions Workplace Strategies Organization Lenovo Directions Smart Devices Typing Virtual Reality Meta Digital Security Cameras Amazon Specifications Remote Working Memory Server Management Private Cloud Google Drive Google Play Identity Theft Internet Exlporer Competition Fraud Knowledge Data Breach Superfish Microchip Electronic Health Records Username Twitter Outsource IT Videos Environment Black Friday 5G Media Wasting Time Error Google Docs Security Cameras Database Unified Communications Social Engineering Experience Trend Micro Software as a Service Bitcoin Remote Computing IT Technicians Running Cable User Small Businesses Displays Cyber Monday Managing Costs Proxy Server Google Wallet Cookies SSID Tablet Tactics Hotspot eCommerce Surveillance Virtual Assistant Windows 8 IP Address Alert Mirgation Laptop Outsourcing Dark Data Virtual Machine Managed IT Drones File Sharing Nanotechnology Medical IT Addiction How To Language Workplace Reviews Development Transportation Management Notifications Chatbots Halloween Recovery Hiring/Firing

Blog Archive