Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Google Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android Data Recovery Disaster Recovery Upgrade AI Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Artificial Intelligence Miscellaneous Holiday Automation Information Gadgets Cloud Computing Training Covid-19 Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Office Windows 10 Data Management Business Continuity Government Virtualization Bandwidth Wi-Fi Blockchain Business Technology Windows 10 Data Security Apps Mobile Office Vendor Two-factor Authentication Gmail Chrome WiFi Budget Networking Employer-Employee Relationship Apple Managed Services Voice over Internet Protocol App BYOD Mobile Device Management Tip of the week Applications Office 365 How To BDR Conferencing Hacker Avoiding Downtime Computing Access Control Marketing Information Technology HIPAA Retail Analytics Office Tips Augmented Reality Big Data Help Desk Managed IT Services Storage Password Bring Your Own Device Healthcare Computers 2FA Virtual Private Network Operating System Website Health Risk Management Router The Internet of Things Scam Data loss Monitoring Social Patch Management Save Money Remote Monitoring Telephone End of Support Remote Workers Vulnerability Customer Service Vendor Management Windows 11 Going Green Physical Security Cooperation Display Excel Printer Free Resource Cybercrime Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Document Management Solutions Firewall Employees Data Privacy Integration User Tip Modem Mobile Security Maintenance Safety Outlook Processor Antivirus Money Humor Holidays Smart Technology Data Storage Sports Mouse Saving Time Video Conferencing Managed Services Provider Robot Virtual Machines Professional Services Customer Relationship Management Administration Managed IT Service Downloads Licensing IT Management Hacking iPhone Presentation VPN Meetings Entertainment Supply Chain Settings Vulnerabilities Wireless Technology Printing Wireless Computer Repair Content Filtering Telephone System YouTube Images 101 Cost Management Multi-Factor Authentication Mobility Cryptocurrency Word Machine Learning Virtual Desktop Data storage LiFi Username Entrepreneur Laptop Server Management Trend Micro Private Cloud Security Cameras Windows 8 Identity Theft Drones Google Apps Black Friday Superfish Software as a Service Managing Costs Twitter IT Maintenance Database Halloween IT Technicians eCommerce Error SSID Undo Business Intelligence Virtual Assistant Proxy Server Social Engineering Shortcuts Cookies Cyber Monday Surveillance Hotspot Virtual Machine Remote Computing Ransmoware Tactics Hacks Scary Stories Mirgation Reviews Medical IT Vendors Tablet Transportation Be Proactive Nanotechnology Fun Development Language Hypervisor Alert Application Workforce Deep Learning Addiction Threats Management Dark Data Chatbots Shopping Managed IT Optimization File Sharing PowerPoint Employer/Employee Relationships IBM How To Workplace Strategies Education Screen Reader Distributed Denial of Service Computing Infrastructure PCI DSS Notifications Navigation Meta Service Level Agreement Amazon Mobile Computing Identity Gig Economy Travel Internet Service Provider Google Maps Teamwork Bookmark Smart Tech Search Techology Alerts Regulations Compliance Evernote Outsource IT Best Practice Download Competition Environment Media Buisness Memes Unified Threat Management Net Neutrality SQL Server Legal Browsers IT solutions Connectivity Break Fix Unified Threat Management Financial Data History Small Businesses Business Growth Upload Displays Social Network Network Congestion Smartwatch Multi-Factor Security IT Procurement Azure User IoT Cortana Dark Web User Error Telework Cyber security Tech Outsourcing Alt Codes Trends Customer Resource management Downtime Regulations CES Google Calendar Communitications Point of Sale Supply Chain Management IP Address Data Analysis Workplace Hosted Solution Star Wars Microsoft Excel Staff FinTech Network Management Tech Support Term Hiring/Firing Typing Gamification Monitors Paperless Social Networking Legislation IT Assessment Flexibility Value Google Drive Fileless Malware Recovery Co-managed IT Knowledge Wearable Technology Organization Websites Hard Drives Technology Care Content Domains Health IT Business Communications Motherboard Digital Security Cameras 5G Comparison Smart Devices SharePoint Remote Working Memory Google Docs Directions Electronic Medical Records Scams Unified Communications Assessment Experience Permissions Running Cable Data Breach Google Play Refrigeration Hybrid Work Bitcoin Public Speaking Google Wallet Writing Human Resources Videos Specifications Lenovo Electronic Health Records Wasting Time Lithium-ion battery Microchip Virtual Reality Cables Internet Exlporer Fraud

Blog Archive