Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Microsoft Productivity Managed Service Passwords Saving Money Quick Tips Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Chrome Managed Services Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR HIPAA Computing Applications Information Technology Hacker Health Help Desk Website Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services 2FA Big Data Operating System Router Physical Security Virtual Private Network Risk Management Computers Paperless Office Infrastructure Monitoring Document Management Remote Workers Firewall Telephone Scam Data loss Windows 11 The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Excel Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Customer Service Display Printer Virtual Desktop Holidays Data Privacy Data storage Wireless Technology LiFi Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Word Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Images 101 Supply Chain Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Printing Wireless Content Filtering Customer Relationship Management IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Hacking Modem Processor Presentation Computer Repair Mobile Security Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Google Apps Laptop Websites Mirgation Hypervisor IT Maintenance IP Address Windows 8 Drones Shopping Nanotechnology Optimization Business Intelligence PowerPoint SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Shortcuts Halloween Chatbots Ransmoware Navigation Management PCI DSS Recovery Lenovo Gig Economy Hard Drives Screen Reader Vendors Writing Distributed Denial of Service Domains Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Be Proactive Scary Stories Private Cloud Identity Workforce Evernote Hacks Server Management Regulations Compliance Superfish Bookmark Refrigeration Identity Theft Smart Tech Memes Threats Fun Public Speaking Deep Learning Download Net Neutrality Twitter Alerts SQL Server Workplace Strategies Error History Meta Lithium-ion battery Financial Data Browsers Smartwatch Education Connectivity IT Entrepreneur Amazon Social Engineering Break Fix Upload Procurement Remote Computing Azure Cyber security Outsource IT Multi-Factor Security Tech Mobile Computing Social Network Telework CES Undo Tablet IoT Communitications Environment Search Dark Web Media Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Small Businesses Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Legal Data Analysis IT solutions Star Wars IT Assessment Displays How To Microsoft Excel Business Growth Gamification Flexibility Notifications Staff Value Application Travel Social Networking Outsourcing Legislation Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Workplace IBM Alt Codes Content Remote Working Wearable Technology Memory Health IT Downtime Unified Threat Management Motherboard Data Breach Hiring/Firing Comparison Google Play Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Paperless Wasting Time Co-managed IT Typing Trend Micro Technology Care Network Congestion Specifications Security Cameras Google Drive User Error Microchip Competition Internet Exlporer Software as a Service Knowledge Fraud Business Communications Managing Costs Scams Username Point of Sale eCommerce Hybrid Work 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Human Resources Running Cable Tech Support IT Technicians Virtual Machine Cables Bitcoin Network Management User

Blog Archive