Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Facebook Artificial Intelligence Miscellaneous Information Covid-19 Training Gadgets Cloud Computing Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Virtualization Bandwidth Blockchain Vendor Mobile Office Two-factor Authentication Data Security Apps Mobile Device Management Tip of the week Gmail Managed Services WiFi Voice over Internet Protocol Chrome Networking Budget Employer-Employee Relationship Apple App BYOD Applications Avoiding Downtime Marketing Computing Access Control Information Technology Conferencing Office 365 How To BDR Hacker HIPAA Router Physical Security Virtual Private Network Operating System Website Health Risk Management Help Desk 2FA Retail Analytics Office Tips Augmented Reality Healthcare Big Data Managed IT Services Storage Password Bring Your Own Device Computers Solutions Going Green Display Printer Cybercrime Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel The Internet of Things Remote Workers Telephone Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring Customer Service End of Support Microsoft 365 Vulnerability Vendor Management Meetings VPN Wireless Technology Employees Settings Modem Wireless Integration Printing User Tip Processor Content Filtering Computer Repair Mobile Security YouTube Word Holidays Cryptocurrency Smart Technology Data Storage Supply Chain Machine Learning Virtual Desktop Video Conferencing Saving Time Managed Services Provider Data storage LiFi Virtual Machines Professional Services Safety Managed IT Service Outlook Maintenance Downloads Antivirus Money Humor Licensing iPhone Entertainment Vulnerabilities Sports Data Privacy Mouse Customer Relationship Management Images 101 Robot Telephone System Administration Cost Management Multi-Factor Authentication Mobility Hacking Presentation IT Management Videos Network Congestion Specifications Electronic Health Records Workforce Wasting Time Threats User Error Microchip Internet Exlporer Cortana Fraud Trend Micro Security Cameras Workplace Strategies Alt Codes Username IP Address Downtime Point of Sale Black Friday Software as a Service Meta Managing Costs Amazon Hosted Solution Database eCommerce SSID Typing Network Management Tech Support IT Technicians Recovery Cookies Hard Drives Monitors Cyber Monday Surveillance Virtual Assistant Outsource IT Proxy Server Virtual Machine Environment Google Drive Media Tactics Domains Knowledge Hotspot Reviews Medical IT Websites Mirgation Nanotechnology Refrigeration 5G Development Transportation Small Businesses Hypervisor Displays Google Docs SharePoint Unified Communications Addiction Public Speaking Experience Electronic Medical Records Language Shopping Optimization PowerPoint Bitcoin Management Lithium-ion battery Running Cable Chatbots Screen Reader Writing Distributed Denial of Service Entrepreneur Employer/Employee Relationships Outsourcing Google Wallet Lenovo Navigation Service Level Agreement Virtual Reality Computing Infrastructure PCI DSS Gig Economy Workplace Windows 8 Server Management Laptop Private Cloud Identity Identity Theft Smart Tech Undo Internet Service Provider Teamwork Hiring/Firing Drones Superfish Bookmark Evernote Paperless Download Twitter Alerts Regulations Compliance Memes Co-managed IT Halloween Error Browsers Connectivity Social Engineering Break Fix Net Neutrality SQL Server Technology Care History Business Communications Upload Remote Computing Financial Data Application Smartwatch Multi-Factor Security IT Scams Hacks Social Network Scary Stories Tablet IoT Fun Dark Web Procurement Azure Hybrid Work Cyber security Tech Human Resources Deep Learning Trends IBM Alert Telework File Sharing Regulations CES Dark Data Google Calendar Communitications Cables Managed IT Customer Resource management Data Analysis Education Star Wars How To Microsoft Excel Supply Chain Management Term Google Apps Gamification Notifications Staff FinTech Travel Social Networking Legislation IT Assessment IT Maintenance Mobile Computing Techology Fileless Malware Google Maps Competition Search Flexibility Value Business Intelligence Organization Shortcuts Best Practice Content Wearable Technology Buisness Unified Threat Management Motherboard Digital Security Cameras Comparison Smart Devices Ransmoware Health IT Memory Vendors Legal Unified Threat Management Directions IT solutions Assessment Permissions Remote Working Data Breach Google Play Be Proactive Business Growth User

Blog Archive