Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones Data Recovery VoIP Business Management AI communications Mobile Devices Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Information Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Employee/Employer Relationship IT Support Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Mobile Device Management Gmail Apple Networking App Computing Applications Information Technology Hacker Access Control Office 365 Avoiding Downtime Conferencing Marketing How To BDR WiFi HIPAA Router Operating System Virtual Private Network Risk Management 2FA Computers Health Help Desk Office Tips Analytics Website Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Vendor Management Cybercrime Physical Security Display Windows 11 Customer Service Printer Monitoring Paperless Office Infrastructure Excel Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Microsoft 365 Going Green Patch Management Save Money Social Remote Monitoring Solutions Vulnerability End of Support Content Filtering Employees IT Management Integration VPN YouTube Meetings Modem Customer Relationship Management User Tip Processor Cryptocurrency Mobile Security Holidays Computer Repair Hacking Presentation Data Storage Virtual Desktop Smart Technology Supply Chain Data storage LiFi Video Conferencing Wireless Technology Managed Services Provider Virtual Machines Professional Services Outlook Saving Time Machine Learning Money Managed IT Service Humor Downloads Word iPhone Maintenance Antivirus Sports Licensing Mouse Vulnerabilities Entertainment Data Privacy Administration Images 101 Safety Multi-Factor Authentication Mobility Telephone System Cost Management Robot Settings Printing Wireless Trend Micro Specifications Security Cameras Workplace Strategies IBM Unified Threat Management Hosted Solution Microchip Typing Internet Exlporer Software as a Service Fraud Meta Username Managing Costs Amazon Network Congestion eCommerce Knowledge Black Friday SSID Google Drive User Error Database Surveillance Virtual Assistant Outsource IT Media Competition Point of Sale IT Technicians Virtual Machine Environment 5G Cookies Experience Cyber Monday Medical IT Google Docs Proxy Server Reviews Unified Communications Bitcoin Network Management Tactics Development Running Cable Tech Support Hotspot Transportation Small Businesses Google Wallet Mirgation Hypervisor Displays Monitors Nanotechnology Optimization PowerPoint User Shopping Windows 8 Addiction Laptop Websites Language Employer/Employee Relationships Outsourcing Navigation Drones Management PCI DSS Chatbots Screen Reader Electronic Medical Records Distributed Denial of Service Workplace IP Address SharePoint Gig Economy Service Level Agreement Internet Service Provider Halloween Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Lenovo Regulations Compliance Identity Writing Smart Tech Memes Virtual Reality Co-managed IT Recovery Bookmark Hacks Server Management Download Net Neutrality Scary Stories Private Cloud Alerts SQL Server Technology Care Hard Drives Business Communications Domains Superfish Financial Data Identity Theft History Fun Connectivity IT Twitter Break Fix Scams Browsers Smartwatch Deep Learning Upload Procurement Error Azure Hybrid Work Refrigeration Multi-Factor Security Tech Human Resources Public Speaking Social Network Telework Education Cyber security Social Engineering IoT Communitications Remote Computing Dark Web Cables Lithium-ion battery CES Entrepreneur Mobile Computing Trends Supply Chain Management Search Google Calendar Term Google Apps Customer Resource management FinTech Tablet Regulations Data Analysis Best Practice Star Wars IT Assessment Alert Microsoft Excel IT Maintenance Undo Managed IT Gamification Flexibility Buisness File Sharing Staff Value Business Intelligence Dark Data Social Networking How To Legislation Shortcuts Legal Organization IT solutions Fileless Malware Digital Security Cameras Business Growth Smart Devices Notifications Ransmoware Content Remote Working Travel Wearable Technology Memory Vendors Motherboard Data Breach Cortana Comparison Google Play Be Proactive Techology Health IT Google Maps Directions Videos Alt Codes Assessment Electronic Health Records Permissions Workforce Application Downtime Unified Threat Management Wasting Time Threats

Blog Archive