Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade Smartphones VoIP Business Management AI Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Information Facebook Gadgets Covid-19 Holiday Training Miscellaneous Cloud Computing Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Employee/Employer Relationship IT Support Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Blockchain Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Mobile Device Management Budget Networking Gmail Apple App BYOD Computing Information Technology Access Control Conferencing Hacker Avoiding Downtime Office 365 Marketing How To BDR HIPAA WiFi Applications Operating System Virtual Private Network Help Desk 2FA Health Risk Management Computers Analytics Office Tips Website Retail Augmented Reality Healthcare Storage Password Managed IT Services Bring Your Own Device Router Big Data Solutions Physical Security Monitoring Cybercrime Display Windows 11 Printer Customer Service Paperless Office Infrastructure Excel Telephone Document Management Cooperation Remote Workers Scam Data loss Firewall Free Resource Project Management The Internet of Things Windows 7 Patch Management Save Money Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Social Going Green VPN Meetings Settings Printing Wireless Employees Content Filtering Customer Relationship Management Smart Technology Integration Computer Repair YouTube Saving Time Cryptocurrency Supply Chain Hacking Holidays Presentation Managed IT Service Data Storage Virtual Desktop Downloads Data storage Machine Learning LiFi Wireless Technology Video Conferencing Licensing Managed Services Provider Professional Services Outlook Virtual Machines Entertainment Money Maintenance Antivirus Word Humor iPhone Telephone System Data Privacy Cost Management Sports Mouse Vulnerabilities Safety Administration Images 101 Robot Multi-Factor Authentication Mobility User Tip Modem Mobile Security Processor IT Management IBM Cyber Monday Proxy Server Videos Alt Codes Network Congestion Cookies Electronic Health Records Amazon Tactics Downtime Hotspot Wasting Time User Error Hosted Solution Mirgation Trend Micro Outsource IT Security Cameras Environment Media Point of Sale Typing Nanotechnology Software as a Service Addiction Language Managing Costs Network Management Google Drive Tech Support Management Chatbots eCommerce Knowledge Small Businesses Competition SSID Surveillance Displays Distributed Denial of Service Virtual Assistant Monitors Screen Reader Service Level Agreement Computing Infrastructure Virtual Machine 5G Medical IT Google Docs Websites Reviews Unified Communications Identity Experience Outsourcing Smart Tech Development Running Cable Transportation User Bookmark Bitcoin Google Wallet Electronic Medical Records Download Alerts Hypervisor Workplace SharePoint PowerPoint Shopping Optimization Hiring/Firing Connectivity Laptop IP Address Break Fix Employer/Employee Relationships Paperless Lenovo Browsers Windows 8 Writing Drones Virtual Reality Upload PCI DSS Co-managed IT Navigation Multi-Factor Security Server Management Private Cloud Social Network Gig Economy Technology Care IoT Internet Service Provider Halloween Dark Web Teamwork Business Communications Superfish Recovery Identity Theft Twitter Trends Regulations Compliance Scams Hard Drives Evernote Google Calendar Error Customer Resource management Regulations Memes Hybrid Work Domains Star Wars Net Neutrality Scary Stories Microsoft Excel SQL Server Human Resources Data Analysis Hacks Social Engineering Remote Computing Gamification Financial Data Staff History Fun Cables Refrigeration Legislation Smartwatch Deep Learning Social Networking IT Public Speaking Procurement Lithium-ion battery Azure Google Apps Tablet Fileless Malware Alert Content Telework Education Wearable Technology Cyber security IT Maintenance Tech Entrepreneur Comparison Managed IT File Sharing Health IT CES Dark Data Motherboard Communitications Business Intelligence Assessment Supply Chain Management Permissions Shortcuts Directions Mobile Computing How To Notifications FinTech Search Ransmoware Undo Term Specifications Travel Best Practice IT Assessment Vendors Internet Exlporer Flexibility Buisness Fraud Value Be Proactive Techology Google Maps Microchip Legal Username Organization IT solutions Workforce Black Friday Unified Threat Management Digital Security Cameras Business Growth Smart Devices Threats Database Remote Working Memory Workplace Strategies Unified Threat Management Application IT Technicians Data Breach Cortana Meta Google Play

Blog Archive