Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: New Windows 10 Features

Tip of the Week: New Windows 10 Features

Windows 10 received its second update in 2018. While some experts believe that this second update is too much, others look at it and are happy that more features and functionality is being added. Today, we’re going to dig into the details about this update, as well as some of the helpful features that you can take advantage of.

Your Phone
In 2017, Microsoft announced that it would discontinue its smartphone division, but that doesn’t mean that there aren’t devices out there that aren’t compatible with Windows 10 to some degree. Microsoft has created ways for devices running Android and iOS to integrate with your Windows 10 operating system. An app developed by Microsoft called Your Phone can sync your photos and text messages, among other features. You can paste photos taken from your mobile device right from your computer, and you can even send SMS messages from your computer through your phone number. Microsoft also has other features that work within iOS devices, but Apple has restricted SMS data in iOS to limit iPhone’s integration with Your Phone.

Timeline
Aside from mobile phone integration, Timeline is a new feature that has come with the 2018 update. Timeline is essentially a more detailed version of Task View, a feature that Windows 10 introduced that gave users the option to see what software was running on their device. Timeline gives users a glimpse of what apps and activities have been used on your Windows 10 PC over the last 30 days. This information is actually synced across multiple machines linked to the same account, so you can see any tasks that were completed by multiple devices in the past thirty days. This feature also works with the Microsoft Edge Apps on Android and iOS, providing the ability to stay focused on progress while mobile.

Enhanced Dictation
Windows 10 has provided an easy way to launch a dictation tool found on the operating system. To do so, you need to enable speech services. Go to Settings > Privacy > Speech, inking, & typing. From here, you can turn on speech services using the button. All you need to do after this is use the Windows key + H to launch the dictation service.

What are some of your favorite ways to use Windows 10? Let us know in the comments and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Phishing Email Workplace Tips Computer Google IT Services Users Collaboration Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Microsoft Small Business Workplace Strategy Data Backup Communication Smartphones Android Saving Money Smartphone Business Management VoIP Mobile Devices communications Passwords Backup Data Recovery Managed Service Managed IT Services Social Media Microsoft Office Upgrade Browser Disaster Recovery Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Gadgets Remote Work Server Managed Service Provider Windows Miscellaneous Outsourced IT Current Events Information Encryption Spam Employee/Employer Relationship Productivity Holiday Windows 10 Government Office Compliance Data Management Business Continuity AI Wi-Fi Training Business Technology Windows 10 Blockchain Virtualization Data Security Apps Two-factor Authentication Mobile Office Bandwidth Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Budget Apple Networking BDR Applications BYOD Computing Hacker Information Technology Avoiding Downtime Conferencing Access Control Office 365 Tip of the week WiFi How To Router Operating System Computers Help Desk Virtual Private Network Risk Management Website Marketing Health Healthcare Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data HIPAA Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Windows 11 Customer Service Cybercrime 2FA Monitoring Display Excel Printer Paperless Office Infrastructure Remote Workers Telephone IT Support Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Data loss Microsoft 365 Social Solutions Employees Integration Robot User Tip Modem Customer Relationship Management Processor Settings Mobile Security Wireless Printing Content Filtering Holidays Hacking IT Management Presentation VPN YouTube Meetings Data Storage Smart Technology Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Wireless Technology Saving Time Computer Repair Virtual Machines Professional Services Virtual Desktop LiFi Managed IT Service Data storage Downloads Word iPhone Outlook Machine Learning Licensing Money Entertainment Vulnerabilities Humor Data Privacy Maintenance Images 101 Safety Antivirus Sports Multi-Factor Authentication Mobility Mouse Telephone System Cost Management Administration IT solutions How To Trend Micro Specifications Security Cameras Workplace Strategies IBM Legal Business Growth Microchip Notifications Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Travel Username Google Maps Cortana eCommerce Black Friday SSID Techology Alt Codes Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Competition Downtime Unified Threat Management Hosted Solution Proxy Server Reviews Cookies Cyber Monday Medical IT Unified Threat Management Typing Tactics Development Hotspot Transportation Small Businesses Network Congestion Mirgation Hypervisor Displays User Shopping Knowledge Physical Security Nanotechnology Optimization PowerPoint Google Drive User Error Addiction Language Employer/Employee Relationships Outsourcing 5G Chatbots Navigation Point of Sale Management PCI DSS Unified Communications Gig Economy Experience Screen Reader Distributed Denial of Service Workplace IP Address Google Docs Bitcoin Network Management Running Cable Tech Support Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Monitors Identity Evernote Paperless Google Wallet Regulations Compliance Recovery Bookmark Smart Tech Memes Co-managed IT Hard Drives Windows 8 Laptop Websites Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Domains Drones Financial Data Browsers Smartwatch Electronic Medical Records Connectivity IT Break Fix Scams SharePoint Refrigeration Halloween Upload Procurement Azure Hybrid Work Writing Cyber security Multi-Factor Security Tech Human Resources Public Speaking Lenovo Social Network Telework CES Virtual Reality IoT Communitications Dark Web Cables Lithium-ion battery Hacks Server Management Entrepreneur Scary Stories Private Cloud Trends Supply Chain Management Fun Regulations Google Calendar Term Google Apps Superfish Identity Theft Customer Resource management FinTech Deep Learning Data Analysis Twitter Star Wars IT Assessment Microsoft Excel IT Maintenance Undo Error Gamification Flexibility Staff Value Business Intelligence Social Engineering Social Networking Legislation Shortcuts Education Organization Fileless Malware Digital Security Cameras Remote Computing Smart Devices Ransmoware Mobile Computing Content Remote Working Wearable Technology Memory Vendors Health IT Search Motherboard Data Breach Comparison Google Play Be Proactive Tablet Application Best Practice Directions Videos Alert Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Managed IT Buisness File Sharing Dark Data

Blog Archive