Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Phishing Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Information Facebook Holiday Miscellaneous Artificial Intelligence Compliance Cloud Computing Covid-19 Training Gadgets Outsourced IT Server Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Wi-Fi Windows 10 Blockchain Virtualization Apps Managed Services Mobile Office Data Security Vendor Two-factor Authentication Employer-Employee Relationship Budget Tip of the week Apple Voice over Internet Protocol App Networking Mobile Device Management Gmail BYOD WiFi Chrome Conferencing Hacker Avoiding Downtime Marketing Managed IT Services How To BDR Computing Information Technology HIPAA Physical Security Applications Office 365 Access Control 2FA Help Desk Storage Password Bring Your Own Device Computers Retail Healthcare Website Operating System Risk Management Router Virtual Private Network Big Data Analytics Office Tips Augmented Reality Health Monitoring Excel Document Management Customer Service Remote Workers Managed IT Service Telephone Scam Data loss Going Green Cooperation Free Resource Project Management Windows 7 Cybercrime Patch Management Firewall Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management The Internet of Things Display Social Printer Paperless Office Windows 11 Infrastructure Data Storage Smart Technology Supply Chain Customer Relationship Management Video Conferencing Machine Learning Managed Services Provider Sports Saving Time Mouse Virtual Machines Professional Services Hacking Presentation Administration Maintenance Downloads Wireless Technology Antivirus iPhone Licensing Entertainment Vulnerabilities Data Privacy Settings Printing Wireless Word Images 101 Content Filtering Telephone System Multi-Factor Authentication YouTube Mobility Robot Cost Management Cryptocurrency Safety IT Management VPN Employees Meetings Virtual Desktop Data storage LiFi Integration User Tip Modem Processor Outlook Mobile Security Computer Repair Money Holidays Humor Websites Mirgation Hypervisor Displays Scary Stories Hacks Shopping Nanotechnology Optimization PowerPoint Fun SharePoint Addiction Deep Learning Language Employer/Employee Relationships Outsourcing Electronic Medical Records Chatbots Navigation Competition Management PCI DSS Lenovo Gig Economy Screen Reader Education Distributed Denial of Service Workplace Writing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Virtual Reality Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Mobile Computing Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Search User Download Net Neutrality Best Practice Alerts SQL Server Technology Care Twitter Error History Buisness Business Communications Financial Data Browsers Smartwatch Legal Connectivity IT IT solutions Break Fix Scams Social Engineering IP Address Upload Procurement Business Growth Azure Hybrid Work Remote Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Dark Web Cables Cortana Recovery Alert Hard Drives Trends Supply Chain Management Alt Codes Managed IT Customer Resource management FinTech File Sharing Regulations Downtime Google Calendar Term Google Apps Dark Data Domains Data Analysis Star Wars IT Assessment Hosted Solution Microsoft Excel IT Maintenance How To Notifications Staff Value Business Intelligence Refrigeration Gamification Flexibility Typing Organization Travel Social Networking Legislation Shortcuts Public Speaking Techology Fileless Malware Digital Security Cameras Google Drive Google Maps Smart Devices Ransmoware Lithium-ion battery Knowledge Wearable Technology Memory Vendors Entrepreneur Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive 5G Unified Threat Management Directions Videos Google Docs Assessment Electronic Health Records Unified Communications Permissions Workforce Experience Wasting Time Threats Running Cable Undo Bitcoin Google Wallet Trend Micro Specifications Security Cameras Workplace Strategies Network Congestion User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Laptop Username Windows 8 Drones Point of Sale eCommerce Black Friday SSID Application Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Halloween Media Network Management Proxy Server Reviews Cookies Cyber Monday Medical IT Monitors IBM Tactics Development Hotspot Transportation Small Businesses

Blog Archive