Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Continue reading
0 Comments

Tip of the Week: Easily Transfer Your Contacts From One Google Account to Another

b2ap3_thumbnail_email_migration_400.jpgGoogle Contacts is a useful tool that allows you to share your contacts with other users. In fact, it’s a great tool in general for any professional who is always on the move, and has to have access to a set of work contacts through an Android device. Today, we’ll help you import and export your Google Contacts to a different Google or Outlook account.

Continue reading
0 Comments

Tip of the Week: Use Android to Get Gmail Functionality for Your Non-Gmail Email Account

b2ap3_thumbnail_switch_your_mail_to_gmail_400.jpgGmail is a great email client, but not everyone uses it as their primary method of email communication. Some might prefer Microsoft Outlook, or they might still be using Yahoo Mail. Even if Google wants you to be using their email service, they know that they can’t win them all. For those who want the experience of Gmail without switching providers, you can now do so on the Gmail app for Android.

Continue reading
0 Comments

Tip of the Week: Quickly and Easily Find That Long Lost Gmail Message

b2ap3_thumbnail_gmail_app_400.jpgAs great as Gmail is, sometimes, you might have difficulty locating certain messages, especially if they were sent months, or even years ago. If you happen to misplace a message, you can use the search feature to locate it.

Tags:
Continue reading
0 Comments

Tip of the Week: Ease Your Email Anxiety with MailTrack

b2ap3_thumbnail_mailtrack_400.jpg.jpgOne of the most unpleasant aspects regarding email is the anxiety associated with sending an important message. Did the message really send? Has the recipient read it yet? Should I contact them and ask if they got my email? The struggle is real. Thankfully, there’s a Chrome extension designed to alleviate this stress by answering these pressing questions.

Continue reading
0 Comments

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade AI VoIP Business Management Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Information Automation Artificial Intelligence Facebook Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Virtualization Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Chrome Tip of the week Mobile Device Management Budget Gmail Apple Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship Computing Information Technology HIPAA Hacker Applications Avoiding Downtime Access Control Office 365 Marketing Conferencing WiFi How To BDR Risk Management Computers Virtual Private Network Router Health Website Analytics Office Tips Augmented Reality Help Desk Storage Retail Password Bring Your Own Device Managed IT Services 2FA Big Data Operating System Healthcare Vendor Management Customer Service Physical Security Free Resource Display Project Management Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions Document Management Monitoring Firewall Scam Data loss Windows 11 The Internet of Things Telephone Going Green Social Excel Cooperation Patch Management Remote Workers Save Money Remote Monitoring Cybercrime End of Support Vulnerability iPhone YouTube Telephone System IT Management Cost Management Meetings Cryptocurrency VPN Vulnerabilities Hacking Presentation Virtual Desktop Images 101 Computer Repair Data Privacy Data storage Wireless Technology LiFi Multi-Factor Authentication Mobility User Tip Modem Mobile Security Outlook Processor Money Machine Learning Humor Word Employees Smart Technology Integration Sports Mouse Maintenance Saving Time Antivirus Holidays Safety Managed IT Service Administration Data Storage Downloads Video Conferencing Supply Chain Licensing Managed Services Provider Professional Services Virtual Machines Entertainment Settings Robot Printing Wireless Content Filtering Customer Relationship Management Unified Threat Management Smartwatch Technology Care Social Networking IT Legislation Procurement Business Communications Google Drive Azure Competition Fileless Malware Knowledge Content Telework Network Congestion Scams Wearable Technology Cyber security Tech User Error Health IT 5G CES Hybrid Work Motherboard Communitications Comparison Assessment Supply Chain Management Human Resources Permissions Google Docs Unified Communications Directions Experience Running Cable Point of Sale FinTech Cables Bitcoin Term User Specifications Google Wallet IT Assessment Internet Exlporer Flexibility Google Apps Fraud Value Network Management Microchip Tech Support Laptop Username Organization Monitors IT Maintenance IP Address Windows 8 Black Friday Drones Digital Security Cameras Business Intelligence Smart Devices Websites Database Remote Working Shortcuts Memory Halloween Ransmoware IT Technicians Data Breach Google Play Recovery Cyber Monday Hard Drives SharePoint Proxy Server Videos Electronic Medical Records Vendors Cookies Electronic Health Records Tactics Be Proactive Hotspot Wasting Time Domains Lenovo Scary Stories Writing Workforce Mirgation Trend Micro Hacks Security Cameras Refrigeration Fun Virtual Reality Threats Nanotechnology Software as a Service Private Cloud Addiction Workplace Strategies Language Managing Costs Public Speaking Deep Learning Server Management Superfish Identity Theft Management Meta Chatbots eCommerce Lithium-ion battery SSID Surveillance Distributed Denial of Service Virtual Assistant Education Entrepreneur Twitter Amazon Screen Reader Error Service Level Agreement Computing Infrastructure Virtual Machine Medical IT Reviews Social Engineering Outsource IT Identity Mobile Computing Development Media Transportation Undo Bookmark Search Remote Computing Environment Smart Tech Download Alerts Hypervisor Best Practice PowerPoint Buisness Tablet Shopping Small Businesses Optimization Break Fix Legal Employer/Employee Relationships IT solutions Browsers Alert Displays Connectivity File Sharing Upload PCI DSS Dark Data Business Growth Navigation Managed IT Application Social Network Gig Economy How To Outsourcing Multi-Factor Security Internet Service Provider Dark Web Teamwork Cortana Notifications IoT Travel Trends Regulations Compliance Workplace IBM Alt Codes Evernote Techology Downtime Google Maps Customer Resource management Hiring/Firing Regulations Memes Google Calendar Net Neutrality Paperless Microsoft Excel SQL Server Hosted Solution Data Analysis Star Wars Unified Threat Management Gamification Financial Data Co-managed IT Staff History Typing

Blog Archive