Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating an Event in Google Calendar

Tip of the Week: Creating an Event in Google Calendar

When you receive countless meeting invites or time-sensitive reminders on a day-to-day basis, it’s easy to forget a thing or two here and there. If you get an email, wouldn’t it be better to just make the event right from your inbox so your calendar can remind you about it when the time comes? Google Calendar and Gmail have this functionality built right in.

Add an Event to Your Calendar from Gmail

First, open your Gmail app on your smartphone or in your web browser. Next, look for an email that references a specific date, time, or location. You’ll be using this message to create your Calendar event.

Next, click on the three-dot menu in the top menu bar. You’ll see it next to Labels. From the menu that appears, click Create Event.

From this new window, you’ll see the option to enable notifications on your desktop PC. Whether you do this or not is up to you.

You’ll notice that an event title will automatically appear: the email’s subject line. Adjust this as needed, then use this opportunity to change any other information that might need correcting, like the date, time, location, description, etc. You can also use this chance to invite other attendees to the meeting so they too can add it to their calendars.

If you want the event to recur, this is also possible. Find these settings and adjust them right in the event itself. You can select it to run all day, too, if you select All Day from the provided time range.

It’s worth mentioning here that you can do all of this from Google Calendar, but the idea here is to get the event, then immediately make the event before you forget to do it.

Hopefully you found some value from today’s blog!

What are some other articles you’d like to see us cover in the future? Be sure to let us know!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 02 May 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Data Backup Microsoft Communication Small Business Mobile Device Smartphones Workplace Strategy Saving Money Smartphone Business Management communications Mobile Devices Android VoIP Managed IT Services Microsoft Office Data Recovery Managed Service Browser Passwords Upgrade Social Media Backup Disaster Recovery Network Tech Term Internet of Things Automation Artificial Intelligence Cloud Computing Covid-19 Remote Server Managed Service Provider Remote Work Windows Facebook Miscellaneous Outsourced IT Encryption Gadgets Spam Windows 10 Information Holiday Employee/Employer Relationship Business Continuity Data Management Government Business Technology Windows 10 Current Events Blockchain Wi-Fi Productivity Two-factor Authentication Bandwidth Compliance Data Security Virtualization Apps Office Chrome Managed Services Budget Voice over Internet Protocol Mobile Device Management Gmail Apple Networking App Employer-Employee Relationship Vendor Access Control Hacker Office 365 Avoiding Downtime Mobile Office Conferencing How To BDR Computing Applications Information Technology Computers Health Help Desk Analytics Office Tips Website Augmented Reality Marketing Retail Storage Healthcare Password Bring Your Own Device Managed IT Services WiFi Big Data AI Operating System BYOD HIPAA Router Virtual Private Network Risk Management Training Paperless Office Windows 11 Infrastructure Monitoring Excel IT Support Tip of the week Document Management Remote Workers Telephone Scam Firewall Data loss Cooperation Free Resource Project Management The Internet of Things Windows 7 Going Green Patch Management Save Money Microsoft 365 Social Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Display Printer Customer Service Presentation Virtual Desktop Holidays Data storage LiFi 2FA Data Storage Wireless Technology Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Word Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Entertainment Administration Vulnerabilities Safety Data Privacy Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Wireless Printing Content Filtering IT Management YouTube Meetings VPN Employees Customer Relationship Management Integration Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Hacking Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development User Hotspot Transportation Small Businesses Laptop Websites Mirgation Hypervisor Displays Windows 8 Drones Shopping Nanotechnology Optimization PowerPoint SharePoint IP Address Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Halloween Chatbots Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Recovery Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Hard Drives Scary Stories Private Cloud Identity Evernote Paperless Hacks Server Management Regulations Compliance Superfish Bookmark Domains Identity Theft Smart Tech Memes Fun Co-managed IT Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Refrigeration Error History Business Communications Financial Data Browsers Smartwatch Public Speaking Education Connectivity IT Social Engineering Break Fix Scams Lithium-ion battery Upload Procurement Remote Computing Azure Hybrid Work Cyber security Entrepreneur Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework CES Tablet IoT Communitications Search Dark Web Cables Best Practice Trends Supply Chain Management Alert Undo Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Ransmoware Alt Codes Content Remote Working Application Wearable Technology Memory Vendors Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos IBM Hosted Solution Assessment Electronic Health Records Permissions Workforce Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Physical Security Fraud Meta Username Managing Costs Amazon Competition Point of Sale eCommerce 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Running Cable Tech Support IT Technicians Virtual Machine Environment Media Bitcoin Network Management

Blog Archive