Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Continue reading
0 Comments

Tip of the Week: Easily Transfer Your Contacts From One Google Account to Another

b2ap3_thumbnail_email_migration_400.jpgGoogle Contacts is a useful tool that allows you to share your contacts with other users. In fact, it’s a great tool in general for any professional who is always on the move, and has to have access to a set of work contacts through an Android device. Today, we’ll help you import and export your Google Contacts to a different Google or Outlook account.

Continue reading
0 Comments

Tip of the Week: Use Android to Get Gmail Functionality for Your Non-Gmail Email Account

b2ap3_thumbnail_switch_your_mail_to_gmail_400.jpgGmail is a great email client, but not everyone uses it as their primary method of email communication. Some might prefer Microsoft Outlook, or they might still be using Yahoo Mail. Even if Google wants you to be using their email service, they know that they can’t win them all. For those who want the experience of Gmail without switching providers, you can now do so on the Gmail app for Android.

Continue reading
0 Comments

Tip of the Week: Quickly and Easily Find That Long Lost Gmail Message

b2ap3_thumbnail_gmail_app_400.jpgAs great as Gmail is, sometimes, you might have difficulty locating certain messages, especially if they were sent months, or even years ago. If you happen to misplace a message, you can use the search feature to locate it.

Tags:
Continue reading
0 Comments

Tip of the Week: Ease Your Email Anxiety with MailTrack

b2ap3_thumbnail_mailtrack_400.jpg.jpgOne of the most unpleasant aspects regarding email is the anxiety associated with sending an important message. Did the message really send? Has the recipient read it yet? Should I contact them and ask if they got my email? The struggle is real. Thankfully, there’s a Chrome extension designed to alleviate this stress by answering these pressing questions.

Continue reading
0 Comments

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Email Workplace Tips Google Computer Phishing Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Training Covid-19 Compliance Gadgets Cloud Computing Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Managed Services Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Password Managed IT Services How To BDR HIPAA Computing Physical Security Hacker Virtual Private Network Risk Management Healthcare Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Bring Your Own Device Big Data 2FA Operating System Computers Router Display Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Windows 7 Firewall Document Management Microsoft 365 Managed IT Service Solutions Telephone The Internet of Things Scam Data loss Social Cooperation Windows 11 Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Excel Vendor Management Customer Service Cybercrime Remote Workers Cryptocurrency Wireless Technology User Tip Modem iPhone Computer Repair Mobile Security Processor Virtual Desktop LiFi Vulnerabilities Data storage Data Privacy Smart Technology Word Images 101 Outlook Machine Learning Mobility Money Saving Time Multi-Factor Authentication Humor Maintenance Safety Antivirus Sports Downloads Employees Mouse Integration Licensing Administration Entertainment Holidays Robot Data Storage Telephone System Cost Management Supply Chain Customer Relationship Management Video Conferencing Settings Wireless Printing Managed Services Provider Professional Services Content Filtering Virtual Machines Hacking IT Management Presentation VPN YouTube Meetings Net Neutrality Username SQL Server Technology Care 5G Black Friday Financial Data History Point of Sale Business Communications Unified Communications Database Scams Experience Smartwatch IP Address Google Docs IT Procurement Bitcoin Network Management Azure Hybrid Work Running Cable Tech Support IT Technicians Monitors Cyber Monday Telework Google Wallet Proxy Server Cyber security Cookies Tech Human Resources Recovery Tactics Cables Hotspot CES Communitications Supply Chain Management Hard Drives Windows 8 Laptop Websites Mirgation FinTech Domains Drones Nanotechnology Term Google Apps IT Assessment Addiction IT Maintenance Electronic Medical Records Language SharePoint Flexibility Refrigeration Management Value Business Intelligence Halloween Chatbots Shortcuts Writing Distributed Denial of Service Organization Public Speaking Lenovo Screen Reader Smart Devices Service Level Agreement Ransmoware Virtual Reality Computing Infrastructure Digital Security Cameras Lithium-ion battery Remote Working Hacks Server Management Memory Vendors Entrepreneur Scary Stories Private Cloud Identity Google Play Be Proactive Fun Superfish Bookmark Data Breach Identity Theft Smart Tech Electronic Health Records Deep Learning Download Workforce Twitter Alerts Videos Undo Wasting Time Threats Error Education Connectivity Security Cameras Workplace Strategies Social Engineering Break Fix Browsers Trend Micro Software as a Service Upload Meta Remote Computing Multi-Factor Security Mobile Computing Social Network Managing Costs Amazon Tablet IoT SSID Search Dark Web eCommerce Surveillance Application Best Practice Trends Virtual Assistant Outsource IT Alert Dark Data Google Calendar Managed IT Customer Resource management Virtual Machine Environment Buisness File Sharing Regulations Media IT solutions Star Wars Medical IT How To Microsoft Excel Reviews IBM Legal Data Analysis Development Business Growth Gamification Transportation Small Businesses Notifications Staff Legislation Hypervisor Displays Travel Social Networking Google Maps PowerPoint Cortana Shopping Techology Fileless Malware Optimization Alt Codes Content Employer/Employee Relationships Outsourcing Wearable Technology Comparison PCI DSS Competition Health IT Downtime Unified Threat Management Motherboard Navigation Hosted Solution Assessment Workplace Permissions Gig Economy Unified Threat Management Directions Internet Service Provider Typing Teamwork Hiring/Firing Network Congestion Specifications Regulations Compliance Evernote Paperless User Internet Exlporer Co-managed IT Knowledge Fraud Google Drive User Error Microchip Memes

Blog Archive