Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Continue reading
0 Comments

Tip of the Week: Easily Transfer Your Contacts From One Google Account to Another

b2ap3_thumbnail_email_migration_400.jpgGoogle Contacts is a useful tool that allows you to share your contacts with other users. In fact, it’s a great tool in general for any professional who is always on the move, and has to have access to a set of work contacts through an Android device. Today, we’ll help you import and export your Google Contacts to a different Google or Outlook account.

Continue reading
0 Comments

Tip of the Week: Use Android to Get Gmail Functionality for Your Non-Gmail Email Account

b2ap3_thumbnail_switch_your_mail_to_gmail_400.jpgGmail is a great email client, but not everyone uses it as their primary method of email communication. Some might prefer Microsoft Outlook, or they might still be using Yahoo Mail. Even if Google wants you to be using their email service, they know that they can’t win them all. For those who want the experience of Gmail without switching providers, you can now do so on the Gmail app for Android.

Continue reading
0 Comments

Tip of the Week: Quickly and Easily Find That Long Lost Gmail Message

b2ap3_thumbnail_gmail_app_400.jpgAs great as Gmail is, sometimes, you might have difficulty locating certain messages, especially if they were sent months, or even years ago. If you happen to misplace a message, you can use the search feature to locate it.

Tags:
Continue reading
0 Comments

Tip of the Week: Ease Your Email Anxiety with MailTrack

b2ap3_thumbnail_mailtrack_400.jpg.jpgOne of the most unpleasant aspects regarding email is the anxiety associated with sending an important message. Did the message really send? Has the recipient read it yet? Should I contact them and ask if they got my email? The struggle is real. Thankfully, there’s a Chrome extension designed to alleviate this stress by answering these pressing questions.

Continue reading
0 Comments

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Efficiency Phishing Privacy Workplace Tips Computer Google Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Small Business Communication Smartphones Mobile Device Workplace Strategy communications Android Business Management Mobile Devices Smartphone VoIP Saving Money Microsoft Office Managed IT Services Browser Managed Service Data Recovery Passwords Social Media Network Upgrade Backup Disaster Recovery Tech Term Internet of Things Automation Covid-19 Remote Cloud Computing Server Managed Service Provider Remote Work Artificial Intelligence Facebook Miscellaneous Encryption Windows Gadgets Spam Holiday Windows 10 Information Outsourced IT Employee/Employer Relationship Data Management Business Continuity Government Blockchain Business Technology Wi-Fi Windows 10 Productivity Two-factor Authentication Virtualization Apps Data Security Bandwidth Compliance Current Events App Mobile Device Management Gmail Vendor Networking Chrome Employer-Employee Relationship Budget Apple Office Managed Services Voice over Internet Protocol Avoiding Downtime Mobile Office Access Control Computing Information Technology Applications Office 365 How To BDR Conferencing Hacker Virtual Private Network Training Website Marketing Health Operating System Router Risk Management Retail WiFi Big Data Analytics Office Tips Help Desk Managed IT Services Augmented Reality Storage Password Bring Your Own Device Computers BYOD Cooperation Display Healthcare Printer Going Green Paperless Office Windows 11 Infrastructure Free Resource Cybercrime Project Management Windows 7 Firewall Excel Tip of the week HIPAA Document Management Microsoft 365 AI Solutions The Internet of Things Scam Data loss Social Monitoring IT Support Patch Management Save Money Remote Monitoring Customer Service End of Support Vulnerability Telephone Vendor Management Remote Workers Computer Repair iPhone Telephone System Settings Vulnerabilities Printing Cost Management Wireless Word 2FA Content Filtering Supply Chain YouTube Images 101 Machine Learning Multi-Factor Authentication Mobility Cryptocurrency Safety User Tip Modem Processor Virtual Desktop Maintenance Mobile Security Data storage LiFi Antivirus Employees Integration Outlook Smart Technology Money Data Privacy Humor Saving Time Holidays Customer Relationship Management Data Storage Robot Sports Managed IT Service Mouse Video Conferencing Hacking Downloads Managed Services Provider Presentation Virtual Machines Professional Services Administration IT Management Licensing Meetings VPN Entertainment Wireless Technology SQL Server Legal IT solutions Trends Amazon IP Address Net Neutrality Point of Sale Regulations Financial Data Google Calendar History Business Growth Customer Resource management Data Analysis Star Wars Smartwatch Outsource IT Microsoft Excel IT Procurement Media Recovery Azure Network Management Gamification Cortana Tech Support Environment Staff Social Networking Telework Monitors Hard Drives Legislation Cyber security Tech Alt Codes Fileless Malware Downtime CES Small Businesses Domains Communitications Supply Chain Management Hosted Solution Content Websites Displays Wearable Technology Motherboard FinTech Refrigeration Comparison Term Typing Health IT SharePoint Directions Assessment Electronic Medical Records Outsourcing Public Speaking Permissions IT Assessment Flexibility Value Google Drive Knowledge Lithium-ion battery Organization Writing Workplace Specifications Entrepreneur Lenovo Microchip Internet Exlporer 5G Digital Security Cameras Virtual Reality Hiring/Firing Fraud Smart Devices Remote Working Paperless Memory Google Docs Unified Communications Server Management Username Experience Private Cloud Running Cable Identity Theft Co-managed IT Undo Black Friday Data Breach Google Play Bitcoin Superfish Google Wallet Database Videos Twitter Technology Care Electronic Health Records IT Technicians Business Communications Wasting Time Error Proxy Server Laptop Cookies Social Engineering Scams Cyber Monday Trend Micro Security Cameras Windows 8 Drones Tactics Remote Computing Hybrid Work Hotspot Software as a Service Mirgation Human Resources Application Managing Costs Halloween Tablet Nanotechnology Cables eCommerce SSID Virtual Assistant Addiction Alert IBM Language Surveillance Chatbots Dark Data Google Apps Virtual Machine Managed IT Management File Sharing Scary Stories Screen Reader Reviews How To IT Maintenance Distributed Denial of Service Medical IT Hacks Transportation Service Level Agreement Fun Notifications Business Intelligence Computing Infrastructure Development Identity Shortcuts Hypervisor Deep Learning Travel Techology Bookmark Google Maps Smart Tech Shopping Ransmoware Competition Optimization PowerPoint Employer/Employee Relationships Education Download Vendors Alerts Unified Threat Management PCI DSS Be Proactive Navigation Unified Threat Management Browsers Connectivity Gig Economy Workforce Break Fix Mobile Computing User Teamwork Upload Search Threats Internet Service Provider Regulations Compliance Network Congestion Workplace Strategies Multi-Factor Security Evernote Best Practice Social Network User Error Buisness IoT Physical Security Meta Dark Web Memes

Blog Archive