Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

This feature has been an experimental add-on for quite some time, but it has since become an official feature of Gmail. To make things even better, it’s super easy to activate and use. All you have to do is click Settings in the top location of your Gmail inbox (under the gear button).

gmail in 1

Next, you’ll want to scroll halfway down the page. Find the Undo Send setting. This is what you’re looking for.

gmail in 2

Once you find it, you want to check the box, Enable Undo Send. There’s also a drop-down menu that gives you the choice of between 5, 10, 20, and 30 seconds where you’ll be able to take back your messages. If you tend to hesitate, the full 30 seconds will provide you with the maximum time required to make up your mind. Just make sure to click Save All Changes before giving it a shot.

Next time you send an email that might be somewhat unsavory, or to the completely wrong user, click Undo at the top of the mailbox. Keep in mind that if you wait too long, your message will be sent. If anything, it’s merely a safeguard against sending anything too salty for your work account. A lot of the time, the kinds of messages you want to take back are ones that can more easily be addressed in person or over the phone.

For more great tips from Voyage Technology, check back with our blog next week.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 01 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade Business Management Smartphones AI VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Network Current Events Remote Tech Term Internet of Things Automation Facebook Artificial Intelligence Information Miscellaneous Gadgets Cloud Computing Holiday Covid-19 Training Remote Work Managed Service Provider Server Outsourced IT Compliance Encryption Employee/Employer Relationship IT Support Spam Windows 10 Office Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Virtualization Bandwidth Blockchain Vendor Mobile Office Two-factor Authentication Data Security Apps Mobile Device Management Tip of the week Gmail Managed Services Voice over Internet Protocol Networking Chrome Employer-Employee Relationship Budget BYOD Apple App Access Control Marketing Applications Computing Information Technology WiFi Conferencing Office 365 How To BDR Hacker Avoiding Downtime HIPAA Website Router Health Operating System 2FA Retail Risk Management Help Desk Healthcare Managed IT Services Big Data Office Tips Analytics Augmented Reality Storage Password Bring Your Own Device Computers Virtual Private Network Going Green Paperless Office Infrastructure Windows 11 Cybercrime Document Management Firewall Monitoring Excel The Internet of Things Scam Data loss Remote Workers Social Telephone Patch Management Free Resource Project Management Save Money Cooperation Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Customer Service Microsoft 365 Physical Security Solutions Display Printer Settings Printing User Tip Wireless Modem Word Holidays Mobile Security Processor Content Filtering Machine Learning YouTube Data Storage Supply Chain Video Conferencing Cryptocurrency Managed Services Provider Smart Technology Virtual Machines Maintenance Professional Services Safety Antivirus Virtual Desktop Saving Time Data storage LiFi Managed IT Service iPhone Outlook Downloads Money Licensing Vulnerabilities Humor Robot Data Privacy Entertainment Customer Relationship Management Images 101 Sports Multi-Factor Authentication Mobility Mouse Hacking IT Management Telephone System Presentation VPN Meetings Administration Cost Management Wireless Technology Computer Repair Employees Integration Monitors Amazon Managing Costs Specifications eCommerce Fraud SSID Microchip Cortana Internet Exlporer Recovery Username Hard Drives Surveillance Outsource IT Virtual Assistant Websites Alt Codes Downtime Domains Environment Virtual Machine Black Friday Media SharePoint Medical IT Electronic Medical Records Hosted Solution Reviews Database Refrigeration Development IT Technicians Small Businesses Transportation Typing Writing Proxy Server Public Speaking Cookies Displays Lenovo Hypervisor Cyber Monday Optimization Hotspot PowerPoint Google Drive Virtual Reality Lithium-ion battery Shopping Knowledge Tactics Mirgation Entrepreneur Outsourcing Server Management Employer/Employee Relationships Private Cloud Identity Theft Navigation PCI DSS 5G Nanotechnology Superfish Language Workplace Google Docs Twitter Unified Communications Gig Economy Experience Addiction Running Cable Management Undo Internet Service Provider Chatbots Hiring/Firing Teamwork Error Bitcoin Paperless Evernote Google Wallet Social Engineering Regulations Compliance Screen Reader Distributed Denial of Service Memes Computing Infrastructure Co-managed IT Remote Computing Service Level Agreement Windows 8 Laptop Net Neutrality Identity Technology Care SQL Server Business Communications Tablet Drones Bookmark Financial Data Smart Tech History Download Application IT Alerts Scams Alert Smartwatch Dark Data Halloween Procurement Hybrid Work Managed IT Azure File Sharing Break Fix Human Resources Tech How To Browsers IBM Telework Connectivity Cyber security CES Upload Communitications Cables Notifications Hacks Scary Stories Social Network Supply Chain Management Multi-Factor Security Travel Dark Web Google Apps Google Maps Term FinTech Fun IoT Techology Trends IT Assessment IT Maintenance Deep Learning Customer Resource management Competition Flexibility Regulations Business Intelligence Value Google Calendar Unified Threat Management Microsoft Excel Shortcuts Education Data Analysis Organization Star Wars Unified Threat Management Digital Security Cameras Gamification Smart Devices Staff Ransmoware Mobile Computing Network Congestion Remote Working Social Networking Vendors Memory Legislation Data Breach Be Proactive Google Play Fileless Malware Search User User Error Videos Content Electronic Health Records Wearable Technology Workforce Best Practice Buisness Health IT Motherboard Threats Wasting Time Comparison Point of Sale Trend Micro Permissions Workplace Strategies Security Cameras Legal IT solutions Directions IP Address Assessment Software as a Service Meta Network Management Tech Support Business Growth

Blog Archive