Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Continue reading
0 Comments

Tip of the Week: Easily Transfer Your Contacts From One Google Account to Another

b2ap3_thumbnail_email_migration_400.jpgGoogle Contacts is a useful tool that allows you to share your contacts with other users. In fact, it’s a great tool in general for any professional who is always on the move, and has to have access to a set of work contacts through an Android device. Today, we’ll help you import and export your Google Contacts to a different Google or Outlook account.

Continue reading
0 Comments

Tip of the Week: Use Android to Get Gmail Functionality for Your Non-Gmail Email Account

b2ap3_thumbnail_switch_your_mail_to_gmail_400.jpgGmail is a great email client, but not everyone uses it as their primary method of email communication. Some might prefer Microsoft Outlook, or they might still be using Yahoo Mail. Even if Google wants you to be using their email service, they know that they can’t win them all. For those who want the experience of Gmail without switching providers, you can now do so on the Gmail app for Android.

Continue reading
0 Comments

Tip of the Week: Quickly and Easily Find That Long Lost Gmail Message

b2ap3_thumbnail_gmail_app_400.jpgAs great as Gmail is, sometimes, you might have difficulty locating certain messages, especially if they were sent months, or even years ago. If you happen to misplace a message, you can use the search feature to locate it.

Tags:
Continue reading
0 Comments

Tip of the Week: Ease Your Email Anxiety with MailTrack

b2ap3_thumbnail_mailtrack_400.jpg.jpgOne of the most unpleasant aspects regarding email is the anxiety associated with sending an important message. Did the message really send? Has the recipient read it yet? Should I contact them and ask if they got my email? The struggle is real. Thankfully, there’s a Chrome extension designed to alleviate this stress by answering these pressing questions.

Continue reading
0 Comments

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Phishing Privacy Google Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Saving Money Passwords AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Holiday Facebook Automation Artificial Intelligence Training Gadgets Compliance Cloud Computing Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Managed Services Apps Data Security Two-factor Authentication Mobile Office Vendor Budget Gmail Apple WiFi Tip of the week App Voice over Internet Protocol Employer-Employee Relationship Networking BYOD Mobile Device Management Chrome Applications Password Access Control Conferencing Computing Managed IT Services How To Information Technology Hacker BDR Avoiding Downtime Office 365 Marketing HIPAA Physical Security Virtual Private Network Storage Health Bring Your Own Device 2FA Help Desk Big Data Retail Healthcare Operating System Computers Risk Management Website Analytics Office Tips Router Augmented Reality Firewall Display Printer Paperless Office Windows 11 Infrastructure The Internet of Things Monitoring Excel Document Management Social Going Green Managed IT Service Remote Workers Telephone Scam Data loss Cybercrime Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions User Tip Modem Computer Repair Mobile Security Processor Sports Mouse Safety Holidays Data Storage Administration Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Maintenance Settings Printing Customer Relationship Management Antivirus Wireless Downloads iPhone Content Filtering Licensing YouTube Vulnerabilities Entertainment Hacking Presentation Data Privacy Cryptocurrency Images 101 Wireless Technology Telephone System Virtual Desktop Multi-Factor Authentication Robot Mobility Data storage LiFi Cost Management Outlook IT Management Word Money VPN Employees Meetings Integration Humor Hacks Public Speaking Username Scary Stories Managing Costs Amazon Lithium-ion battery Point of Sale eCommerce Fun Black Friday SSID Entrepreneur Virtual Assistant Outsource IT Deep Learning Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Education Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Undo Tactics Development Mobile Computing Websites Mirgation Hypervisor Displays Shopping Nanotechnology Optimization Search PowerPoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Best Practice Management PCI DSS Buisness Chatbots Navigation Writing Distributed Denial of Service Workplace Legal Lenovo Gig Economy IT solutions Application Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Business Growth IBM Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Cortana Download Net Neutrality Twitter Alerts SQL Server Technology Care Alt Codes Financial Data Downtime Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Hosted Solution Connectivity IT Competition Upload Procurement Remote Computing Azure Hybrid Work Typing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Google Drive CES Tablet IoT Communitications Knowledge Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech User File Sharing Regulations 5G Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Google Docs Data Analysis Unified Communications Star Wars IT Assessment Experience Gamification Flexibility Running Cable Notifications Staff Value Business Intelligence Bitcoin Google Wallet IP Address Organization Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Laptop Wearable Technology Memory Vendors Windows 8 Drones Health IT Recovery Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Hard Drives Assessment Electronic Health Records Domains Halloween Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip Refrigeration Internet Exlporer Software as a Service

Blog Archive