Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Make a QR Code in Chrome

How to Make a QR Code in Chrome

You’ve probably seen QR codes all over the place, especially now that everyone has a built-in scanner right on their smartphone’s camera. They provide businesses with quick and easy ways to share information about resources, whether those resources are instruction manuals, assembly directions, restaurant menus, or even business cards. You can easily make QR codes for your business using a built-in Google Chrome feature.

Continue reading
0 Comments

Tip of the Week: Creating an Event in Google Calendar

Tip of the Week: Creating an Event in Google Calendar

When you receive countless meeting invites or time-sensitive reminders on a day-to-day basis, it’s easy to forget a thing or two here and there. If you get an email, wouldn’t it be better to just make the event right from your inbox so your calendar can remind you about it when the time comes? Google Calendar and Gmail have this functionality built right in.

Continue reading
0 Comments

Tip of the Week: Change Your Android’s Screen Resolution

Tip of the Week: Change Your Android’s Screen Resolution

Have you ever wondered what a different screen resolution might look like on your Android device? Well, now you don’t have to! Today’s tip is all about changing the screen resolution on your device, for better or worse. Let’s take a look at how to do it.

Continue reading
0 Comments

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Many businesses looking to consolidate their tools are turning to cloud services and software suites that offer a centralized collection of solutions—such as the G Suite, as offered by Google. While G Suite offers the Google Drive as a means of organizing your work resources and documents, different files can sometimes be saved in different places. This week, our tip is going to cover how you can work around this fact with a feature called Workspaces.

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Efficiency User Tips Hardware Internet IT Support Malware Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Backup Cybersecurity Microsoft Communication Passwords Saving Money Data Backup Smartphone Android Managed Service Business Management Smartphones VoIP Upgrade communications Mobile Devices Disaster Recovery Data Recovery Browser Social Media Productivity Microsoft Office Windows Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Gadgets Managed Service Provider Information Remote Work Training Miscellaneous Server Outsourced IT Encryption Employee/Employer Relationship Spam Compliance Windows 10 Office Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology IT Support Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps App Mobile Device Management BYOD Gmail Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Budget Apple Networking BDR Marketing HIPAA Computing Applications Information Technology WiFi Access Control Office 365 Tip of the week Conferencing Hacker How To Avoiding Downtime Website Operating System Router Virtual Private Network Risk Management Big Data Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Computers Bring Your Own Device Managed IT Services Windows 7 Going Green Patch Management Microsoft 365 Save Money Remote Monitoring End of Support Vulnerability Solutions Vendor Management Firewall Cybercrime Physical Security Display The Internet of Things Printer Paperless Office Infrastructure Social Monitoring Document Management Remote Workers Customer Service Telephone Scam Windows 11 Data loss 2FA Cooperation Free Resource Excel Project Management Images 101 Robot Telephone System Multi-Factor Authentication Mobility Cost Management Word Settings Wireless Printing Content Filtering IT Management Employees VPN YouTube Meetings Integration Data Privacy Cryptocurrency Safety User Tip Modem Mobile Security Computer Repair Processor Holidays Virtual Desktop LiFi Data storage Data Storage Smart Technology Video Conferencing Outlook Managed Services Provider Machine Learning Professional Services Saving Time Money Virtual Machines Customer Relationship Management Humor Managed IT Service Maintenance Antivirus Sports Hacking Downloads Presentation iPhone Mouse Licensing Administration Wireless Technology Vulnerabilities Entertainment Supply Chain IT solutions Microsoft Excel How To Data Analysis Legal Workplace Star Wars IT Assessment Hiring/Firing Gamification Flexibility Business Growth Staff Value Notifications Recovery Organization Paperless Social Networking Travel Hard Drives Legislation Smart Devices Google Maps Domains Cortana Fileless Malware Digital Security Cameras Techology Co-managed IT Technology Care Content Remote Working Alt Codes Wearable Technology Memory Refrigeration Comparison Google Play Health IT Business Communications Motherboard Data Breach Downtime Unified Threat Management Assessment Electronic Health Records Hosted Solution Public Speaking Permissions Directions Videos Unified Threat Management Scams Hybrid Work Typing Lithium-ion battery Wasting Time Specifications Security Cameras Network Congestion Entrepreneur Human Resources Trend Micro Internet Exlporer Software as a Service Fraud Knowledge Microchip Google Drive User Error Cables Username Managing Costs Undo Black Friday SSID 5G Google Apps eCommerce Point of Sale Database Surveillance Unified Communications Virtual Assistant Experience Google Docs IT Maintenance Business Intelligence Bitcoin Network Management IT Technicians Virtual Machine Running Cable Tech Support Cyber Monday Medical IT Monitors Proxy Server Reviews Google Wallet Shortcuts Cookies Tactics Development Hotspot Transportation Ransmoware Vendors Windows 8 Mirgation Hypervisor Laptop Websites Application PowerPoint Shopping Drones Be Proactive Nanotechnology Optimization Addiction IBM Language Employer/Employee Relationships Electronic Medical Records SharePoint Workforce Threats Management PCI DSS Chatbots Halloween Navigation Distributed Denial of Service Writing Gig Economy Lenovo Workplace Strategies Screen Reader Meta Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Virtual Reality Amazon Regulations Compliance Hacks Server Management Identity Scary Stories Private Cloud Evernote Competition Fun Bookmark Superfish Smart Tech Memes Identity Theft Outsource IT Download Net Neutrality Deep Learning Alerts SQL Server Twitter Environment Financial Data Media History Error Break Fix Social Engineering Browsers Smartwatch Connectivity IT Education Small Businesses Upload Procurement Azure Remote Computing User Displays Social Network Telework Mobile Computing Cyber security Multi-Factor Security Tech Tablet Dark Web Search CES IoT Communitications Outsourcing Trends Supply Chain Management Best Practice IP Address Alert Dark Data Customer Resource management FinTech Managed IT Regulations Buisness File Sharing Google Calendar Term

Blog Archive