Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

Continue reading
0 Comments

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

Continue reading
0 Comments

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Facebook Miscellaneous Artificial Intelligence Holiday Automation Compliance Gadgets Cloud Computing Covid-19 Training Outsourced IT Remote Work Server Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Data Management Government Business Continuity Windows 10 Wi-Fi Virtualization Blockchain Bandwidth Business Technology Data Security Two-factor Authentication Apps Vendor Mobile Office Managed Services Gmail Networking WiFi Employer-Employee Relationship BYOD Chrome Budget Apple Tip of the week App Mobile Device Management Voice over Internet Protocol Computing Managed IT Services How To Information Technology BDR Office 365 HIPAA Physical Security Applications Hacker Password Access Control Avoiding Downtime Marketing Conferencing Healthcare Operating System Risk Management Big Data Analytics Office Tips Router Augmented Reality Virtual Private Network Storage Computers Bring Your Own Device Health 2FA Help Desk Website Retail Firewall Telephone Scam Data loss Cybercrime The Internet of Things Cooperation Free Resource Project Management Windows 7 Patch Management Social Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Going Green Remote Workers Managed IT Service Maintenance Settings Wireless Downloads Printing Antivirus Content Filtering iPhone Licensing Safety YouTube Entertainment Vulnerabilities Cryptocurrency Data Privacy Images 101 Multi-Factor Authentication Robot Mobility Telephone System Virtual Desktop Data storage LiFi Cost Management Outlook Customer Relationship Management IT Management Meetings Money VPN Employees Humor Integration Modem Hacking User Tip Processor Computer Repair Mobile Security Presentation Sports Holidays Mouse Wireless Technology Data Storage Administration Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Word Public Speaking Alt Codes Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Lithium-ion battery Financial Data Downtime Browsers Smartwatch Entrepreneur Hosted Solution Connectivity IT Social Engineering Break Fix Scams Typing Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES Tablet IoT Communitications Knowledge Dark Web Cables Undo Google Drive Trends Supply Chain Management Alert File Sharing Regulations 5G Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Data Analysis Unified Communications Star Wars IT Assessment Experience How To Microsoft Excel IT Maintenance Google Docs Bitcoin Gamification Flexibility Running Cable Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Application Google Wallet Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware IBM Windows 8 Content Remote Working Laptop Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Drones Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Halloween Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Fraud Meta Competition Hacks Username Scary Stories Managing Costs Amazon Point of Sale eCommerce Fun Black Friday SSID Deep Learning Database Surveillance Virtual Assistant Outsource IT Media User Network Management Tech Support IT Technicians Virtual Machine Environment Education Cookies Monitors Cyber Monday Medical IT Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses IP Address Mobile Computing Websites Mirgation Hypervisor Displays Nanotechnology Optimization Search PowerPoint Shopping SharePoint Best Practice Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Recovery Management PCI DSS Buisness Chatbots Lenovo Gig Economy IT solutions Screen Reader Writing Distributed Denial of Service Workplace Hard Drives Legal Domains Business Growth Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Cortana Co-managed IT Refrigeration

Blog Archive