Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Privacy Phishing IT Support Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Managed Service Users AI Ransomware Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Gadgets Cloud Computing Compliance Training Covid-19 Remote Work Outsourced IT Server IT Support Managed Service Provider Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Vendor Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Business Technology Data Security Managed Services Apps Two-factor Authentication Mobile Office Mobile Device Management Budget Gmail Apple Networking WiFi App Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Applications Password Managed IT Services How To BDR Conferencing Computing Physical Security Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Router Retail Storage Bring Your Own Device 2FA Help Desk Big Data Operating System Healthcare Risk Management Virtual Private Network Computers Health Analytics Website Office Tips Augmented Reality Firewall Scam Data loss Windows 11 Monitoring The Internet of Things Excel Social Going Green Patch Management Save Money Remote Monitoring End of Support Managed IT Service Vulnerability Remote Workers Vendor Management Telephone Cybercrime Customer Service Display Printer Cooperation Free Resource Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Document Management Solutions Employees Integration Maintenance Antivirus User Tip Sports Modem Mobile Security Mouse Processor Safety Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Robot Professional Services Saving Time Virtual Machines Settings Wireless Printing Content Filtering Downloads IT Management Customer Relationship Management iPhone VPN YouTube Meetings Licensing Cryptocurrency Hacking Vulnerabilities Entertainment Presentation Computer Repair Data Privacy Virtual Desktop Images 101 Data storage LiFi Wireless Technology Mobility Telephone System Multi-Factor Authentication Cost Management Outlook Machine Learning Money Humor Word Specifications Security Cameras Workplace Strategies Hacks Server Management Scary Stories Private Cloud Trend Micro Identity Theft Internet Exlporer Software as a Service Refrigeration Fun Fraud Meta Superfish Microchip Deep Learning Username Public Speaking Twitter Managing Costs Amazon Black Friday SSID Lithium-ion battery Error eCommerce Education Database Surveillance Social Engineering Virtual Assistant Outsource IT Entrepreneur Remote Computing IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Mobile Computing Proxy Server Reviews Cookies Tablet Tactics Development Undo Search Hotspot Transportation Small Businesses Best Practice Alert Mirgation Hypervisor Displays Dark Data PowerPoint Managed IT Shopping Buisness File Sharing Nanotechnology Optimization IT solutions Addiction How To Language Employer/Employee Relationships Outsourcing Legal Business Growth Management PCI DSS Notifications Chatbots Navigation Application Distributed Denial of Service Workplace Gig Economy Travel Screen Reader Google Maps Service Level Agreement Internet Service Provider Cortana Computing Infrastructure Teamwork Hiring/Firing Techology Alt Codes Regulations Compliance IBM Identity Evernote Paperless Smart Tech Memes Co-managed IT Bookmark Downtime Unified Threat Management Hosted Solution Download Net Neutrality Alerts SQL Server Technology Care Unified Threat Management Business Communications Typing Financial Data History Connectivity IT Network Congestion Break Fix Scams Browsers Smartwatch Google Drive User Error Upload Procurement Competition Knowledge Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Point of Sale IoT Communitications 5G Dark Web Cables CES Google Docs Unified Communications Trends Supply Chain Management Experience Google Calendar Term Google Apps Bitcoin Network Management Customer Resource management FinTech Running Cable Tech Support Regulations User Star Wars IT Assessment Monitors Microsoft Excel IT Maintenance Google Wallet Data Analysis Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Windows 8 Organization IP Address Laptop Websites Social Networking Smart Devices Ransmoware Drones Fileless Malware Digital Security Cameras SharePoint Content Remote Working Electronic Medical Records Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Halloween Motherboard Data Breach Recovery Assessment Electronic Health Records Hard Drives Writing Permissions Workforce Lenovo Directions Videos Domains Virtual Reality Wasting Time Threats

Blog Archive