Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

Tip of the Week: Easily Alter Individual App Volumes in Windows 10

When you’re in the thick of the workday, you’re likely to miss a notification, especially with so much media playing all at the same time. To make sure that your notification sounds don’t get drowned out by your other applications, we’ve put together a tip on how you can adjust the volume levels of your individual applications in Windows 10.

The first step is to open up your sound mixer.

How to Open Your Sound Mixer

You can right-click the volume control icon in your toolbar to open the volume mixer. This is a notable trick because it bypasses the master volume control.

You should see a small window open up displaying the different applications you might have open. There will also be an option to adjust the volume of your device in general. This window gives you direct control of the volume for not only any applications you have open, but for all system notifications as well. This means that you can customize the volume for apps like your VoIP solution, web browser, or other media applications.

After playing around with it for a bit, you’ll discover the perfect mix that best enables you to catch the important notifications that come in.

If you want a hand with implementing some of the tools we’ve mentioned above, then perhaps you should give Voyage Technology a call at 800.618.9844! We’re tech gurus in every sense of the word, so we are sure our managed services can help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 04 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Automation Facebook Miscellaneous Artificial Intelligence Holiday Training Covid-19 Gadgets Cloud Computing Compliance Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Business Technology Blockchain Wi-Fi Windows 10 Virtualization Bandwidth Managed Services Mobile Office Vendor Two-factor Authentication Data Security Apps App Voice over Internet Protocol Tip of the week Mobile Device Management Gmail Networking WiFi Chrome Budget Employer-Employee Relationship BYOD Apple Avoiding Downtime Access Control Marketing Computing HIPAA Information Technology Applications Office 365 Managed IT Services How To BDR Conferencing Password Physical Security Hacker Health Website Healthcare Operating System Router Risk Management Retail Office Tips Analytics Help Desk Big Data Augmented Reality Storage 2FA Bring Your Own Device Computers Virtual Private Network Printer Cooperation Going Green Paperless Office Remote Workers Infrastructure Cybercrime Document Management Firewall Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Monitoring Solutions Social Patch Management Save Money Windows 11 Remote Monitoring Vulnerability Managed IT Service End of Support Vendor Management Telephone Customer Service Excel Display Virtual Machines Professional Services Computer Repair Wireless Technology Settings Telephone System Printing Cost Management Wireless iPhone Content Filtering Word Machine Learning Data Privacy YouTube Vulnerabilities Cryptocurrency Images 101 Maintenance Antivirus Modem User Tip Safety Processor Multi-Factor Authentication Virtual Desktop Mobility Mobile Security Data storage LiFi Outlook Smart Technology Employees Money Humor Integration Saving Time Robot Sports Customer Relationship Management Mouse Holidays Downloads Supply Chain IT Management VPN Meetings Data Storage Hacking Administration Licensing Presentation Video Conferencing Entertainment Managed Services Provider Gig Economy Legal Paperless Trends IT solutions Regulations Tech Support Google Calendar Co-managed IT Internet Service Provider Customer Resource management Business Growth Network Management Teamwork Technology Care Regulations Compliance Data Analysis Star Wars Evernote Microsoft Excel Monitors IP Address Business Communications Memes Gamification Staff Cortana SQL Server Social Networking Websites Legislation Scams Net Neutrality Alt Codes Hybrid Work Financial Data Fileless Malware Recovery History Downtime Smartwatch SharePoint Hard Drives Human Resources IT Content Hosted Solution Wearable Technology Electronic Medical Records Azure Motherboard Comparison Domains Cables Procurement Health IT Typing Telework Directions Lenovo Cyber security Assessment Tech Permissions Writing CES Google Drive Refrigeration Google Apps Communitications Knowledge Virtual Reality Private Cloud Specifications Public Speaking IT Maintenance Supply Chain Management Server Management Lithium-ion battery Business Intelligence FinTech Microchip Superfish Internet Exlporer Identity Theft Term Fraud 5G Google Docs Shortcuts IT Assessment Username Unified Communications Entrepreneur Experience Twitter Value Running Cable Error Black Friday Ransmoware Flexibility Bitcoin Vendors Organization Google Wallet Database Social Engineering Remote Computing Digital Security Cameras Undo Be Proactive Smart Devices IT Technicians Proxy Server Windows 8 Memory Cookies Laptop Cyber Monday Workforce Remote Working Threats Drones Data Breach Tactics Tablet Google Play Hotspot Mirgation Alert Videos Workplace Strategies Electronic Health Records Managed IT Wasting Time Nanotechnology Halloween File Sharing Dark Data Meta Amazon Application Trend Micro Addiction Security Cameras Language How To Chatbots Notifications Software as a Service Management Hacks Managing Costs Screen Reader Scary Stories Travel Distributed Denial of Service IBM Outsource IT Environment Techology Media eCommerce Service Level Agreement Google Maps SSID Computing Infrastructure Fun Identity Surveillance Deep Learning Virtual Assistant Bookmark Virtual Machine Smart Tech Unified Threat Management Small Businesses Displays Reviews Unified Threat Management Download Education Medical IT Alerts Competition Development Transportation Browsers Mobile Computing Hypervisor Connectivity Break Fix Network Congestion Outsourcing Shopping User Error Optimization Upload PowerPoint Search Multi-Factor Security Workplace Social Network Best Practice Employer/Employee Relationships User IoT Buisness Point of Sale Navigation Dark Web Hiring/Firing PCI DSS

Blog Archive