Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Passwords Backup Quick Tips Saving Money Cybersecurity Communication Managed Service Smartphone Data Backup Android Upgrade VoIP Business Management Smartphones AI Data Recovery communications Mobile Devices Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption IT Support Spam Office Windows 10 Business Continuity Government Data Management Windows 10 Wi-Fi Virtualization Blockchain Business Technology Bandwidth Data Security Mobile Office Two-factor Authentication Apps Vendor Apple Networking App Mobile Device Management Managed Services Voice over Internet Protocol BYOD Gmail Tip of the week Chrome Employer-Employee Relationship Budget Applications Hacker Avoiding Downtime How To BDR Marketing Conferencing Computing Information Technology WiFi Access Control Office 365 HIPAA Storage Password Computers Bring Your Own Device Managed IT Services 2FA Help Desk Website Operating System Healthcare Risk Management Virtual Private Network Health Big Data Analytics Office Tips Augmented Reality Router Retail Customer Service Scam Data loss Windows 11 Monitoring Excel Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Remote Workers Firewall Vendor Management Cybercrime Telephone Physical Security Display Printer Cooperation Free Resource The Internet of Things Project Management Paperless Office Windows 7 Infrastructure Social Microsoft 365 Document Management Solutions Maintenance Modem Hacking Antivirus Sports User Tip Processor Mobile Security Presentation Mouse Holidays Administration Wireless Technology Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Robot Virtual Machines Professional Services Saving Time Word Settings Wireless Managed IT Service Printing Content Filtering Downloads IT Management iPhone VPN YouTube Meetings Licensing Safety Cryptocurrency Entertainment Vulnerabilities Computer Repair Data Privacy Virtual Desktop Images 101 Data storage LiFi Multi-Factor Authentication Mobility Telephone System Cost Management Outlook Machine Learning Money Customer Relationship Management Humor Employees Integration Deep Learning Twitter Username Managing Costs Amazon eCommerce Black Friday SSID Error Education Social Engineering Database Surveillance Virtual Assistant Outsource IT Media User Remote Computing IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Mobile Computing Proxy Server Reviews Tablet Search Tactics Development Hotspot Transportation Small Businesses IP Address Best Practice Alert Mirgation Hypervisor Displays Dark Data Nanotechnology Optimization PowerPoint Managed IT Buisness File Sharing Shopping IT solutions How To Addiction Language Employer/Employee Relationships Outsourcing Legal Navigation Recovery Business Growth Notifications Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Hard Drives Travel Gig Economy Google Maps Cortana Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Domains Techology Evernote Paperless Alt Codes Regulations Compliance Identity Smart Tech Memes Co-managed IT Refrigeration Downtime Unified Threat Management Bookmark Hosted Solution Download Net Neutrality Alerts SQL Server Technology Care Public Speaking Unified Threat Management Lithium-ion battery Business Communications Typing Financial Data History Browsers Smartwatch Network Congestion Connectivity IT Break Fix Scams Entrepreneur Google Drive User Error Knowledge Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Social Network Telework Point of Sale CES 5G IoT Communitications Dark Web Cables Undo Google Docs Unified Communications Experience Trends Supply Chain Management Regulations Google Calendar Term Google Apps Bitcoin Network Management Running Cable Tech Support Customer Resource management FinTech Data Analysis Monitors Star Wars IT Assessment Microsoft Excel IT Maintenance Google Wallet Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Application Windows 8 Laptop Websites Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Drones SharePoint Electronic Medical Records Content Remote Working Wearable Technology Memory Vendors IBM Motherboard Data Breach Comparison Google Play Be Proactive Halloween Health IT Directions Videos Writing Assessment Electronic Health Records Permissions Workforce Lenovo Virtual Reality Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Hacks Server Management Scary Stories Private Cloud Identity Theft Microchip Fun Internet Exlporer Software as a Service Fraud Meta Competition Superfish

Blog Archive