Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Communication Productivity Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones AI VoIP Mobile Devices Data Recovery communications Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Automation Facebook Artificial Intelligence Information Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Business Technology Virtualization Bandwidth Wi-Fi Blockchain Windows 10 Vendor Two-factor Authentication Apps Data Security Mobile Office Tip of the week Chrome Budget Employer-Employee Relationship Networking Apple App BYOD Mobile Device Management Managed Services Voice over Internet Protocol Gmail Applications Office 365 WiFi How To Conferencing BDR Hacker Avoiding Downtime Marketing Computing Information Technology Access Control HIPAA Router Analytics Office Tips Big Data Augmented Reality Retail Help Desk Storage Password Managed IT Services Bring Your Own Device Computers Website Operating System Virtual Private Network 2FA Risk Management Healthcare Health The Internet of Things Document Management Free Resource Project Management Social Windows 7 Monitoring Microsoft 365 Scam Data loss Solutions Customer Service Telephone Patch Management Save Money Remote Monitoring Going Green End of Support Vulnerability Vendor Management Cooperation Physical Security Cybercrime Windows 11 Display Printer Firewall Remote Workers Paperless Office Infrastructure Excel Virtual Desktop Safety iPhone Data storage LiFi User Tip Modem Vulnerabilities Machine Learning Outlook Processor Mobile Security Images 101 Money Humor Multi-Factor Authentication Maintenance Mobility Antivirus Smart Technology Data Privacy Customer Relationship Management Sports Saving Time Mouse Employees Administration Managed IT Service Integration Hacking Presentation Downloads Robot Wireless Technology Licensing Holidays Entertainment Settings Data Storage Wireless IT Management Printing Content Filtering Video Conferencing VPN Meetings Managed Services Provider Word YouTube Telephone System Virtual Machines Professional Services Cost Management Computer Repair Cryptocurrency Supply Chain Smartwatch IT Specifications Workplace Websites Google Wallet Undo Microchip Internet Exlporer Procurement Fraud Azure Hiring/Firing SharePoint Cyber security Tech Paperless Electronic Medical Records Windows 8 Laptop Username Telework CES Communitications Black Friday Co-managed IT Drones Writing Database Supply Chain Management Lenovo Technology Care IT Technicians Term Business Communications Virtual Reality Halloween FinTech Proxy Server Cookies IT Assessment Server Management Cyber Monday Scams Application Private Cloud Hybrid Work Identity Theft Tactics Flexibility Superfish Hotspot Value Mirgation IBM Human Resources Twitter Hacks Scary Stories Organization Digital Security Cameras Fun Nanotechnology Smart Devices Cables Error Social Engineering Deep Learning Addiction Remote Working Language Memory Chatbots Data Breach Google Play Google Apps Remote Computing Management Education Videos Screen Reader Electronic Health Records Distributed Denial of Service IT Maintenance Business Intelligence Competition Tablet Service Level Agreement Computing Infrastructure Wasting Time Identity Trend Micro Security Cameras Shortcuts Alert Mobile Computing Dark Data Bookmark Search Smart Tech Software as a Service Managed IT Ransmoware File Sharing Vendors How To Best Practice Download Alerts Managing Costs eCommerce SSID Be Proactive User Notifications Buisness IT solutions Browsers Connectivity Surveillance Break Fix Virtual Assistant Workforce Travel Legal Virtual Machine Threats Google Maps Business Growth Upload Techology Reviews IP Address Multi-Factor Security Medical IT Workplace Strategies Social Network Cortana IoT Development Dark Web Transportation Meta Unified Threat Management Hypervisor Amazon Alt Codes Trends Unified Threat Management Customer Resource management Shopping Regulations Optimization Google Calendar PowerPoint Recovery Downtime Network Congestion Hosted Solution Data Analysis Star Wars Microsoft Excel Employer/Employee Relationships Outsource IT Hard Drives User Error Staff Environment Domains Navigation Media Typing Gamification PCI DSS Gig Economy Social Networking Legislation Point of Sale Google Drive Fileless Malware Knowledge Internet Service Provider Teamwork Small Businesses Refrigeration Wearable Technology Displays Public Speaking Evernote Content Regulations Compliance Health IT 5G Motherboard Memes Lithium-ion battery Network Management Comparison Tech Support Google Docs Entrepreneur Monitors Unified Communications Directions Experience Assessment Net Neutrality Permissions SQL Server Outsourcing History Bitcoin Running Cable Financial Data

Blog Archive