Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Holiday Facebook Automation Miscellaneous Information Cloud Computing Training Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Wi-Fi Bandwidth Windows 10 Business Technology Virtualization Blockchain Vendor Data Security Two-factor Authentication Mobile Office Apps Networking Chrome BYOD Managed Services Mobile Device Management Budget Voice over Internet Protocol Gmail Apple WiFi App Tip of the week Employer-Employee Relationship Computing Applications Information Technology How To Hacker BDR Avoiding Downtime Office 365 Marketing Conferencing Access Control HIPAA Router Risk Management Managed IT Services Computers 2FA Help Desk Office Tips Website Analytics Augmented Reality Physical Security Storage Password Healthcare Virtual Private Network Bring Your Own Device Health Big Data Retail Operating System Scam Data loss Customer Service Windows 11 Monitoring Patch Management Save Money Remote Monitoring Excel End of Support Vulnerability Vendor Management Remote Workers Firewall Display Telephone Printer Paperless Office Infrastructure The Internet of Things Cooperation Free Resource Project Management Windows 7 Going Green Document Management Social Microsoft 365 Solutions Cybercrime YouTube Employees Integration Cryptocurrency Hacking Modem User Tip Processor Presentation Mobile Security Holidays Virtual Desktop Wireless Technology Data storage LiFi Robot Data Storage Smart Technology Supply Chain Video Conferencing Outlook Managed Services Provider Saving Time Virtual Machines Money Professional Services Humor IT Management Word Meetings VPN Managed IT Service Downloads Sports Mouse iPhone Computer Repair Licensing Safety Entertainment Vulnerabilities Administration Data Privacy Images 101 Machine Learning Multi-Factor Authentication Mobility Telephone System Cost Management Settings Printing Wireless Maintenance Content Filtering Customer Relationship Management Antivirus Trend Micro Specifications Security Cameras Workplace Strategies Social Engineering Knowledge Microchip Competition Internet Exlporer Software as a Service Google Drive Fraud Meta Remote Computing Username Managing Costs Amazon eCommerce Tablet Black Friday SSID 5G Experience Database Surveillance Google Docs Virtual Assistant Outsource IT Unified Communications Alert Bitcoin File Sharing Media Running Cable Dark Data Managed IT User IT Technicians Virtual Machine Environment Cookies Google Wallet Cyber Monday Medical IT How To Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Notifications Windows 8 Travel Laptop IP Address Mirgation Hypervisor Displays Shopping Techology Nanotechnology Optimization Drones Google Maps PowerPoint Addiction Language Employer/Employee Relationships Outsourcing Recovery Chatbots Unified Threat Management Navigation Halloween Management PCI DSS Gig Economy Unified Threat Management Hard Drives Screen Reader Distributed Denial of Service Workplace Domains Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Hacks Evernote Paperless Scary Stories Network Congestion Regulations Compliance Bookmark User Error Refrigeration Smart Tech Memes Co-managed IT Fun Public Speaking Download Net Neutrality Alerts SQL Server Technology Care Deep Learning History Point of Sale Business Communications Lithium-ion battery Financial Data Browsers Smartwatch Connectivity IT Entrepreneur Break Fix Scams Education Upload Procurement Network Management Azure Hybrid Work Tech Support Cyber security Mobile Computing Multi-Factor Security Tech Human Resources Monitors Social Network Telework CES Undo IoT Communitications Dark Web Cables Search Trends Supply Chain Management Best Practice Websites Regulations Google Calendar Term Google Apps Buisness Customer Resource management FinTech Data Analysis SharePoint Star Wars IT Assessment Legal Microsoft Excel IT Maintenance IT solutions Electronic Medical Records Gamification Flexibility Staff Value Business Intelligence Business Growth Application Social Networking Legislation Shortcuts Writing Organization Lenovo Fileless Malware Digital Security Cameras Smart Devices Ransmoware Virtual Reality Cortana IBM Content Remote Working Server Management Wearable Technology Memory Vendors Alt Codes Private Cloud Superfish Motherboard Data Breach Identity Theft Comparison Google Play Be Proactive Downtime Health IT Directions Videos Assessment Electronic Health Records Permissions Workforce Hosted Solution Twitter Typing Error Wasting Time Threats

Blog Archive