Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Continue reading
0 Comments

Tip of the Week: Easily Transfer Your Contacts From One Google Account to Another

b2ap3_thumbnail_email_migration_400.jpgGoogle Contacts is a useful tool that allows you to share your contacts with other users. In fact, it’s a great tool in general for any professional who is always on the move, and has to have access to a set of work contacts through an Android device. Today, we’ll help you import and export your Google Contacts to a different Google or Outlook account.

Continue reading
0 Comments

Tip of the Week: Use Android to Get Gmail Functionality for Your Non-Gmail Email Account

b2ap3_thumbnail_switch_your_mail_to_gmail_400.jpgGmail is a great email client, but not everyone uses it as their primary method of email communication. Some might prefer Microsoft Outlook, or they might still be using Yahoo Mail. Even if Google wants you to be using their email service, they know that they can’t win them all. For those who want the experience of Gmail without switching providers, you can now do so on the Gmail app for Android.

Continue reading
0 Comments

Tip of the Week: Quickly and Easily Find That Long Lost Gmail Message

b2ap3_thumbnail_gmail_app_400.jpgAs great as Gmail is, sometimes, you might have difficulty locating certain messages, especially if they were sent months, or even years ago. If you happen to misplace a message, you can use the search feature to locate it.

Tags:
Continue reading
0 Comments

Tip of the Week: Ease Your Email Anxiety with MailTrack

b2ap3_thumbnail_mailtrack_400.jpg.jpgOne of the most unpleasant aspects regarding email is the anxiety associated with sending an important message. Did the message really send? Has the recipient read it yet? Should I contact them and ask if they got my email? The struggle is real. Thankfully, there’s a Chrome extension designed to alleviate this stress by answering these pressing questions.

Continue reading
0 Comments

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Managed Service Data Backup Smartphone Android Upgrade AI Business Management Smartphones Disaster Recovery Data Recovery VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Automation Facebook Artificial Intelligence Miscellaneous Information Holiday Training Gadgets Covid-19 Cloud Computing Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Virtualization Bandwidth Blockchain Wi-Fi Two-factor Authentication Apps Data Security Mobile Office Vendor Mobile Device Management Managed Services Voice over Internet Protocol Gmail Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Applications Information Technology Access Control Office 365 WiFi Conferencing How To BDR Hacker Avoiding Downtime HIPAA Marketing Computing Virtual Private Network Risk Management Healthcare Health Help Desk Analytics Office Tips Augmented Reality Big Data Retail Storage Password Bring Your Own Device Managed IT Services Computers Operating System 2FA Website Router Display Printer Firewall Remote Workers Paperless Office Infrastructure Monitoring The Internet of Things Free Resource Document Management Project Management Social Windows 7 Microsoft 365 Telephone Scam Data loss Solutions Customer Service Cooperation Going Green Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Excel Physical Security Virtual Machines Professional Services Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi iPhone Safety Smart Technology Outlook Machine Learning Vulnerabilities Data Privacy Money Saving Time Humor Images 101 Managed IT Service Multi-Factor Authentication Mobility Maintenance Sports Downloads Antivirus Mouse Customer Relationship Management Licensing Entertainment Administration Employees Hacking Integration Presentation Telephone System Robot Wireless Technology Cost Management Settings Holidays Printing Wireless Content Filtering Data Storage Supply Chain IT Management VPN YouTube Meetings Video Conferencing Managed Services Provider Word Gig Economy Workplace Username Refrigeration Point of Sale 5G Black Friday Internet Service Provider Teamwork Hiring/Firing Regulations Compliance Google Docs Evernote Paperless Public Speaking Unified Communications Database Experience Running Cable Tech Support IT Technicians Memes Co-managed IT Lithium-ion battery Bitcoin Network Management SQL Server Technology Care Google Wallet Proxy Server Cookies Entrepreneur Monitors Cyber Monday Net Neutrality Financial Data History Business Communications Tactics Hotspot Laptop Websites Mirgation Smartwatch IT Scams Windows 8 Azure Hybrid Work Drones Undo Nanotechnology Procurement Telework Cyber security SharePoint Tech Human Resources Addiction Electronic Medical Records Language Halloween Chatbots CES Communitications Cables Management Lenovo Screen Reader Writing Distributed Denial of Service Supply Chain Management FinTech Term Google Apps Service Level Agreement Virtual Reality Computing Infrastructure Application Scary Stories Private Cloud Identity IT Assessment IT Maintenance Hacks Server Management Value Business Intelligence Superfish Bookmark Identity Theft Smart Tech Fun Flexibility Organization Shortcuts IBM Deep Learning Download Twitter Alerts Error Digital Security Cameras Smart Devices Ransmoware Memory Vendors Browsers Education Connectivity Social Engineering Break Fix Remote Working Data Breach Google Play Be Proactive Upload Remote Computing Videos Multi-Factor Security Electronic Health Records Workforce Mobile Computing Social Network Wasting Time Threats Competition Tablet IoT Search Dark Web Trend Micro Security Cameras Workplace Strategies Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar Software as a Service Meta Managed IT Customer Resource management Managing Costs Amazon Legal Data Analysis IT solutions Star Wars How To Microsoft Excel eCommerce SSID Business Growth Gamification User Notifications Staff Travel Social Networking Legislation Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Techology Fileless Malware Media Google Maps Cortana Wearable Technology Reviews Medical IT IP Address Alt Codes Content Health IT Downtime Unified Threat Management Motherboard Comparison Development Transportation Small Businesses Hypervisor Displays Unified Threat Management Directions Hosted Solution Assessment Permissions Shopping Optimization PowerPoint Typing Recovery Hard Drives Network Congestion Specifications Employer/Employee Relationships Outsourcing Google Drive User Error Microchip Navigation Domains Internet Exlporer Knowledge Fraud PCI DSS

Blog Archive