Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Disaster Recovery Upgrade Data Recovery Business Management Smartphones VoIP Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Artificial Intelligence Information Holiday Automation Facebook Cloud Computing Gadgets Training Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Virtualization Blockchain Bandwidth Business Technology Wi-Fi Windows 10 Apps Vendor Mobile Office Data Security Two-factor Authentication Chrome BYOD Budget Employer-Employee Relationship Apple Tip of the week App Mobile Device Management Networking Gmail Managed Services Voice over Internet Protocol WiFi HIPAA Applications Access Control Hacker Avoiding Downtime Marketing Conferencing Computing Information Technology How To BDR Office 365 Office Tips Analytics Big Data Augmented Reality Router Storage Password Virtual Private Network Bring Your Own Device Health Computers 2FA Help Desk Website Retail Operating System Risk Management Managed IT Services Healthcare Remote Monitoring Vulnerability End of Support Free Resource Social Vendor Management Project Management Windows 7 Physical Security Microsoft 365 Display Printer Customer Service Solutions Paperless Office Infrastructure Windows 11 Monitoring Going Green Document Management Excel Cybercrime Scam Telephone Data loss Firewall Remote Workers Cooperation The Internet of Things Patch Management Save Money Outlook Telephone System Vulnerabilities Cost Management Money Humor IT Management VPN Meetings Images 101 Mobility Multi-Factor Authentication Customer Relationship Management Sports Computer Repair Mouse Modem User Tip Processor Mobile Security Hacking Administration Employees Presentation Integration Machine Learning Smart Technology Wireless Technology Supply Chain Saving Time Settings Holidays Printing Wireless Content Filtering Data Storage Maintenance Antivirus Word Managed IT Service Video Conferencing YouTube Downloads Managed Services Provider Cryptocurrency Professional Services Virtual Machines Licensing Entertainment Safety Data Privacy Virtual Desktop Data storage LiFi iPhone Robot Tech Social Networking Legislation Telework Cyber security Shortcuts Communitications Ransmoware Fileless Malware Halloween Unified Threat Management CES Supply Chain Management Vendors Unified Threat Management Application Content Wearable Technology Term Motherboard Comparison FinTech Be Proactive Health IT IBM IT Assessment Workforce Directions Hacks Assessment Scary Stories Permissions Network Congestion Flexibility Threats User Error Value Fun Specifications Organization Workplace Strategies Deep Learning Smart Devices Meta Microchip Internet Exlporer Point of Sale Fraud Digital Security Cameras Remote Working Amazon Memory Username Education Network Management Google Play Tech Support Black Friday Competition Data Breach Electronic Health Records Outsource IT Mobile Computing Database Monitors Videos Search Environment Wasting Time Media IT Technicians Best Practice Security Cameras Cookies Websites Cyber Monday Trend Micro Proxy Server Software as a Service Small Businesses User Tactics Buisness Hotspot Electronic Medical Records Displays Legal SharePoint Managing Costs IT solutions Mirgation Business Growth SSID Nanotechnology eCommerce IP Address Surveillance Outsourcing Lenovo Virtual Assistant Addiction Language Writing Cortana Virtual Reality Virtual Machine Management Chatbots Alt Codes Server Management Medical IT Screen Reader Private Cloud Distributed Denial of Service Reviews Workplace Development Hiring/Firing Superfish Recovery Transportation Service Level Agreement Downtime Identity Theft Computing Infrastructure Identity Twitter Hard Drives Hypervisor Paperless Hosted Solution Bookmark Typing PowerPoint Smart Tech Error Shopping Domains Optimization Co-managed IT Technology Care Employer/Employee Relationships Download Alerts Social Engineering Knowledge Remote Computing PCI DSS Google Drive Refrigeration Business Communications Navigation Scams Browsers Connectivity Break Fix Gig Economy Public Speaking Lithium-ion battery Internet Service Provider Hybrid Work Teamwork Upload Tablet 5G Experience Alert Multi-Factor Security Regulations Compliance Google Docs Human Resources Social Network Unified Communications Entrepreneur Evernote Memes Cables Bitcoin Managed IT IoT Running Cable File Sharing Dark Web Dark Data Net Neutrality Google Wallet SQL Server Trends How To Regulations Notifications Google Calendar Financial Data Undo History Google Apps Customer Resource management IT IT Maintenance Data Analysis Windows 8 Star Wars Laptop Travel Microsoft Excel Smartwatch Procurement Business Intelligence Drones Techology Azure Gamification Google Maps Staff

Blog Archive