Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Make a QR Code in Chrome

How to Make a QR Code in Chrome

You’ve probably seen QR codes all over the place, especially now that everyone has a built-in scanner right on their smartphone’s camera. They provide businesses with quick and easy ways to share information about resources, whether those resources are instruction manuals, assembly directions, restaurant menus, or even business cards. You can easily make QR codes for your business using a built-in Google Chrome feature.

Continue reading
0 Comments

Tip of the Week: Creating an Event in Google Calendar

Tip of the Week: Creating an Event in Google Calendar

When you receive countless meeting invites or time-sensitive reminders on a day-to-day basis, it’s easy to forget a thing or two here and there. If you get an email, wouldn’t it be better to just make the event right from your inbox so your calendar can remind you about it when the time comes? Google Calendar and Gmail have this functionality built right in.

Continue reading
0 Comments

Tip of the Week: Change Your Android’s Screen Resolution

Tip of the Week: Change Your Android’s Screen Resolution

Have you ever wondered what a different screen resolution might look like on your Android device? Well, now you don’t have to! Today’s tip is all about changing the screen resolution on your device, for better or worse. Let’s take a look at how to do it.

Continue reading
0 Comments

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Many businesses looking to consolidate their tools are turning to cloud services and software suites that offer a centralized collection of solutions—such as the G Suite, as offered by Google. While G Suite offers the Google Drive as a means of organizing your work resources and documents, different files can sometimes be saved in different places. This week, our tip is going to cover how you can work around this fact with a feature called Workspaces.

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Computer Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android Disaster Recovery AI Data Recovery Upgrade Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Information Automation Facebook Artificial Intelligence Holiday Miscellaneous Gadgets Covid-19 Cloud Computing Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Business Technology Wi-Fi Windows 10 Virtualization Bandwidth Blockchain Apps Vendor Mobile Office Data Security Two-factor Authentication Employer-Employee Relationship Apple Tip of the week App Networking Mobile Device Management Managed Services Gmail Voice over Internet Protocol BYOD Chrome WiFi Budget Access Control HIPAA Applications Hacker Avoiding Downtime Computing Marketing How To Information Technology BDR Conferencing Office 365 Bring Your Own Device Health Router Computers Retail Operating System Help Desk Website Managed IT Services Risk Management Analytics Office Tips Healthcare Augmented Reality 2FA Big Data Virtual Private Network Storage Password Windows 7 Paperless Office Infrastructure Microsoft 365 Customer Service Solutions Document Management Going Green Monitoring Scam Data loss Cybercrime Firewall Patch Management Telephone Save Money Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management The Internet of Things Cooperation Windows 11 Physical Security Display Social Printer Free Resource Excel Project Management Images 101 Mouse Multi-Factor Authentication Mobility Administration Customer Relationship Management Machine Learning User Tip Modem Hacking Employees Mobile Security Processor Presentation Integration Maintenance Settings Data Privacy Wireless Technology Wireless Antivirus Printing Content Filtering Smart Technology Holidays YouTube Cryptocurrency Saving Time Data Storage Word Video Conferencing Managed Services Provider Managed IT Service Robot Virtual Machines Professional Services Virtual Desktop LiFi Downloads Data storage Licensing Safety Outlook IT Management Entertainment VPN iPhone Money Meetings Humor Supply Chain Vulnerabilities Telephone System Computer Repair Sports Cost Management Education Content Monitors IBM Wearable Technology Workplace IT Assessment Value Health IT Motherboard Hiring/Firing Flexibility Comparison Organization Permissions Paperless Mobile Computing Directions Websites Assessment Search Digital Security Cameras Co-managed IT Smart Devices Memory Best Practice Electronic Medical Records Technology Care Remote Working Specifications SharePoint Fraud Business Communications Data Breach Google Play Microchip Buisness Internet Exlporer Competition IT solutions Username Writing Videos Scams Electronic Health Records Lenovo Legal Wasting Time Business Growth Virtual Reality Hybrid Work Black Friday Human Resources Trend Micro Server Management Security Cameras Private Cloud Database Cortana IT Technicians User Cables Software as a Service Superfish Identity Theft Managing Costs Alt Codes Proxy Server Twitter Cookies Cyber Monday Hotspot Google Apps eCommerce SSID Error Downtime Tactics Hosted Solution Social Engineering IP Address Mirgation IT Maintenance Surveillance Virtual Assistant Virtual Machine Typing Remote Computing Nanotechnology Business Intelligence Reviews Language Shortcuts Medical IT Addiction Tablet Management Knowledge Chatbots Recovery Ransmoware Development Transportation Google Drive Hypervisor Alert Screen Reader Hard Drives Vendors Distributed Denial of Service Dark Data Domains 5G Shopping Computing Infrastructure Be Proactive Optimization Managed IT PowerPoint File Sharing Service Level Agreement Unified Communications How To Experience Identity Workforce Employer/Employee Relationships Google Docs Navigation Bitcoin Bookmark Notifications Running Cable Smart Tech Refrigeration Threats PCI DSS Public Speaking Gig Economy Alerts Workplace Strategies Google Wallet Travel Download Google Maps Lithium-ion battery Meta Internet Service Provider Techology Teamwork Entrepreneur Evernote Windows 8 Browsers Laptop Connectivity Amazon Regulations Compliance Break Fix Upload Memes Drones Unified Threat Management Social Network Outsource IT Net Neutrality Multi-Factor Security Unified Threat Management SQL Server Dark Web Media History Halloween IoT Undo Environment Financial Data Trends Network Congestion Smartwatch IT Customer Resource management Regulations Small Businesses Procurement Google Calendar User Error Azure Microsoft Excel Cyber security Tech Hacks Data Analysis Scary Stories Star Wars Displays Telework Gamification Fun CES Staff Communitications Point of Sale Deep Learning Social Networking Application Outsourcing Supply Chain Management Legislation FinTech Network Management Term Fileless Malware Tech Support

Blog Archive