Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade Data Recovery VoIP Business Management Smartphones AI Disaster Recovery Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Vendor Two-factor Authentication Mobile Office Data Security Apps Tip of the week Chrome Mobile Device Management Budget Managed Services Voice over Internet Protocol Gmail Apple Networking App Employer-Employee Relationship BYOD Information Technology Applications Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Computing HIPAA Router Virtual Private Network Risk Management Computers Health 2FA Analytics Website Office Tips Help Desk Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Customer Service Display Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Firewall Remote Workers Scam Telephone Data loss The Internet of Things Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Social Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Vendor Management Cybercrime Solutions Physical Security Employees Cryptocurrency Hacking Integration Presentation Computer Repair Modem User Tip Processor Virtual Desktop Mobile Security Data storage LiFi Wireless Technology Holidays Outlook Data Storage Machine Learning Smart Technology Supply Chain Money Video Conferencing Humor Managed Services Provider Word Virtual Machines Professional Services Saving Time Maintenance Sports Managed IT Service Antivirus Mouse Downloads Safety iPhone Administration Licensing Vulnerabilities Entertainment Data Privacy Robot Images 101 Settings Mobility Telephone System Multi-Factor Authentication Printing Cost Management Wireless Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Trend Micro Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Point of Sale Fraud Meta 5G Google Docs Username Unified Communications Managing Costs Amazon Experience eCommerce Running Cable Tech Support User Black Friday SSID Bitcoin Network Management Google Wallet Database Surveillance Virtual Assistant Outsource IT Monitors Media IT Technicians Virtual Machine Environment Cookies Laptop Websites Cyber Monday Medical IT Proxy Server Reviews Windows 8 IP Address Drones Tactics Development Hotspot Transportation Small Businesses SharePoint Mirgation Hypervisor Displays Electronic Medical Records Nanotechnology Optimization Halloween Recovery PowerPoint Shopping Lenovo Addiction Hard Drives Language Employer/Employee Relationships Outsourcing Writing Navigation Management PCI DSS Domains Chatbots Virtual Reality Screen Reader Scary Stories Private Cloud Distributed Denial of Service Workplace Gig Economy Hacks Server Management Superfish Service Level Agreement Internet Service Provider Identity Theft Refrigeration Computing Infrastructure Teamwork Hiring/Firing Fun Evernote Paperless Regulations Compliance Deep Learning Public Speaking Identity Twitter Lithium-ion battery Smart Tech Memes Error Co-managed IT Bookmark Download Net Neutrality Education Alerts SQL Server Technology Care Social Engineering Entrepreneur Business Communications Financial Data History Remote Computing Connectivity IT Break Fix Scams Browsers Smartwatch Mobile Computing Upload Procurement Tablet Undo Azure Hybrid Work Search Multi-Factor Security Tech Human Resources Social Network Telework Best Practice Cyber security Alert IoT Communitications Buisness File Sharing Dark Web Cables Dark Data CES Managed IT Legal Trends Supply Chain Management IT solutions How To Google Calendar Term Google Apps Customer Resource management FinTech Business Growth Regulations Notifications Star Wars IT Assessment Travel Application Microsoft Excel IT Maintenance Data Analysis Techology Gamification Flexibility Google Maps Staff Value Business Intelligence Cortana Legislation Shortcuts Organization Alt Codes IBM Social Networking Fileless Malware Digital Security Cameras Smart Devices Downtime Unified Threat Management Ransmoware Unified Threat Management Content Remote Working Hosted Solution Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Health IT Typing Directions Videos Assessment Electronic Health Records Permissions Workforce Network Congestion Google Drive User Error Competition Wasting Time Threats Knowledge

Blog Archive