Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Efficiency Phishing Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Data Backup Microsoft Small Business Mobile Device Communication Smartphones Android Workplace Strategy Business Management Mobile Devices communications Smartphone VoIP Saving Money Microsoft Office Managed IT Services Data Recovery Browser Managed Service Passwords Social Media Upgrade Backup Disaster Recovery Network Tech Term Internet of Things Automation Cloud Computing Covid-19 Remote Server Managed Service Provider Artificial Intelligence Remote Work Facebook Miscellaneous Windows Gadgets Spam Encryption Holiday Information Windows 10 Employee/Employer Relationship Outsourced IT Government Data Management Business Continuity Windows 10 Blockchain Business Technology Productivity Wi-Fi Compliance Data Security Two-factor Authentication Bandwidth Virtualization Current Events Apps Networking Managed Services Voice over Internet Protocol Mobile Device Management Gmail Chrome Budget Vendor Apple Employer-Employee Relationship App Office Avoiding Downtime Information Technology How To Mobile Office BDR Office 365 Applications Access Control Hacker Computing Conferencing Risk Management Managed IT Services Website Marketing Office Tips Analytics Augmented Reality BYOD Storage Virtual Private Network Password WiFi Router Training Bring Your Own Device Big Data Health Help Desk Retail Operating System Computers Telephone Remote Workers Healthcare Cooperation Patch Management Save Money Firewall Windows 11 Remote Monitoring Vulnerability IT Support End of Support Free Resource Vendor Management Project Management Windows 7 Excel The Internet of Things HIPAA Microsoft 365 Display Printer AI Solutions Paperless Office Social Infrastructure Tip of the week Going Green Document Management Monitoring Customer Service Cybercrime Scam Data loss Professional Services Cryptocurrency Virtual Machines Downloads Licensing Virtual Desktop Word Entertainment Data storage LiFi iPhone Robot Outlook Vulnerabilities 2FA Telephone System Money Supply Chain Cost Management Humor IT Management Safety VPN Meetings Images 101 Mobility Multi-Factor Authentication Sports Mouse Computer Repair User Tip Modem Administration Processor Employees Mobile Security Integration Machine Learning Customer Relationship Management Data Privacy Smart Technology Settings Holidays Printing Hacking Wireless Content Filtering Saving Time Data Storage Presentation Maintenance Antivirus Video Conferencing YouTube Managed Services Provider Managed IT Service Wireless Technology IP Address Workforce Gig Economy Download Alerts Internet Service Provider Teamwork Tablet Threats 5G Alert Experience Workplace Strategies Browsers Regulations Compliance Connectivity Google Docs Break Fix Evernote Unified Communications Managed IT Bitcoin Recovery File Sharing Running Cable Meta Dark Data Upload Memes Social Network Net Neutrality SQL Server Google Wallet Multi-Factor Security Hard Drives Amazon How To Notifications Financial Data IoT History Dark Web Domains Windows 8 Travel Laptop Outsource IT Smartwatch Trends IT Media Customer Resource management Procurement Regulations Techology Azure Drones Google Calendar Refrigeration Google Maps Environment Data Analysis Telework Star Wars Cyber security Microsoft Excel Public Speaking Tech Staff Lithium-ion battery Unified Threat Management Halloween Small Businesses CES Gamification Communitications Supply Chain Management Social Networking Unified Threat Management Legislation Displays Entrepreneur Fileless Malware FinTech Term IT Assessment Wearable Technology Hacks Scary Stories Outsourcing Network Congestion Content Fun Health IT Flexibility Motherboard User Error Value Comparison Undo Physical Security Deep Learning Workplace Directions Organization Assessment Permissions Smart Devices Point of Sale Hiring/Firing Digital Security Cameras Paperless Remote Working Memory Specifications Education Network Management Google Play Tech Support Co-managed IT Microchip Internet Exlporer Data Breach Fraud Electronic Health Records Mobile Computing Application Technology Care Monitors Videos Username Search Business Communications Wasting Time Black Friday Security Cameras Best Practice Websites Scams Database Trend Micro IBM Software as a Service IT Technicians Buisness Hybrid Work Electronic Medical Records Human Resources Proxy Server Cookies SharePoint Managing Costs Legal Cyber Monday IT solutions SSID Business Growth Cables Tactics eCommerce Hotspot Surveillance Mirgation Lenovo Virtual Assistant Writing Virtual Reality Cortana Google Apps Nanotechnology Virtual Machine Competition Server Management Medical IT Alt Codes Private Cloud IT Maintenance Reviews Addiction Language Development Chatbots Superfish Transportation Identity Theft Downtime Business Intelligence Management Twitter Shortcuts Screen Reader Hypervisor Distributed Denial of Service Hosted Solution PowerPoint Typing User Error Ransmoware Shopping Service Level Agreement Optimization Computing Infrastructure Identity Employer/Employee Relationships Vendors Social Engineering Remote Computing Knowledge Be Proactive Bookmark PCI DSS Smart Tech Google Drive Navigation

Blog Archive