Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

This feature has been an experimental add-on for quite some time, but it has since become an official feature of Gmail. To make things even better, it’s super easy to activate and use. All you have to do is click Settings in the top location of your Gmail inbox (under the gear button).

gmail in 1

Next, you’ll want to scroll halfway down the page. Find the Undo Send setting. This is what you’re looking for.

gmail in 2

Once you find it, you want to check the box, Enable Undo Send. There’s also a drop-down menu that gives you the choice of between 5, 10, 20, and 30 seconds where you’ll be able to take back your messages. If you tend to hesitate, the full 30 seconds will provide you with the maximum time required to make up your mind. Just make sure to click Save All Changes before giving it a shot.

Next time you send an email that might be somewhat unsavory, or to the completely wrong user, click Undo at the top of the mailbox. Keep in mind that if you wait too long, your message will be sent. If anything, it’s merely a safeguard against sending anything too salty for your work account. A lot of the time, the kinds of messages you want to take back are ones that can more easily be addressed in person or over the phone.

For more great tips from Voyage Technology, check back with our blog next week.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 02 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Workplace Strategy Small Business Quick Tips Cybersecurity Microsoft Backup Passwords Communication Data Backup Saving Money Smartphone Android Managed Service VoIP Business Management Smartphones Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Productivity Windows Microsoft Office Managed IT Services Current Events AI Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Gadgets Cloud Computing Holiday Covid-19 Miscellaneous Training Server Managed Service Provider Information Remote Work Outsourced IT Encryption Spam Compliance Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Business Technology IT Support Blockchain Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office Vendor App Employer-Employee Relationship Managed Services BYOD Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Apple Networking How To WiFi BDR Conferencing Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Tip of the week Marketing HIPAA Applications Big Data Help Desk Operating System Healthcare Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Augmented Reality Retail Router Storage Password Bring Your Own Device Managed IT Services The Internet of Things Windows 11 Monitoring 2FA Going Green Patch Management Social Save Money Excel Remote Monitoring Vulnerability End of Support Vendor Management Remote Workers Cybercrime Telephone Physical Security Customer Service Display Printer Cooperation Free Resource Paperless Office Infrastructure Project Management Windows 7 Microsoft 365 Document Management Solutions Firewall Scam Data loss Holidays Data Storage Smart Technology Supply Chain Video Conferencing Robot Managed Services Provider Saving Time Settings Virtual Machines Professional Services Printing Wireless Content Filtering IT Management Customer Relationship Management Managed IT Service VPN YouTube Meetings Downloads Cryptocurrency iPhone Licensing Hacking Presentation Computer Repair Entertainment Vulnerabilities Data Privacy Virtual Desktop LiFi Wireless Technology Data storage Images 101 Telephone System Multi-Factor Authentication Mobility Outlook Machine Learning Cost Management Money Word Humor Maintenance Employees Antivirus Sports Integration Mouse User Tip Modem Mobile Security Safety Processor Administration Best Practice Proxy Server Reviews Alert Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Managed IT Buisness File Sharing Tactics Development Dark Data How To Mirgation Hypervisor Displays Legal IT solutions Business Growth Shopping Notifications Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Travel Application Addiction Management PCI DSS Cortana Chatbots Navigation Techology Google Maps Alt Codes IBM Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Downtime Unified Threat Management Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Unified Threat Management Hosted Solution Typing Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Download Net Neutrality Network Congestion Competition Financial Data Knowledge History Business Communications Google Drive User Error Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Point of Sale Upload Procurement 5G Social Network Telework Experience Cyber security Multi-Factor Security Tech Human Resources Google Docs Unified Communications Bitcoin Network Management CES Running Cable Tech Support User IoT Communitications Dark Web Cables Google Wallet Trends Supply Chain Management Monitors Customer Resource management FinTech Regulations Google Calendar Term Google Apps Windows 8 IP Address Data Analysis Laptop Websites Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Drones Gamification Flexibility Organization Electronic Medical Records Social Networking Legislation Shortcuts SharePoint Fileless Malware Digital Security Cameras Halloween Recovery Smart Devices Ransmoware Writing Wearable Technology Memory Vendors Lenovo Hard Drives Content Remote Working Domains Health IT Virtual Reality Motherboard Data Breach Comparison Google Play Be Proactive Hacks Server Management Directions Videos Scary Stories Private Cloud Assessment Electronic Health Records Permissions Workforce Fun Wasting Time Threats Superfish Identity Theft Refrigeration Deep Learning Public Speaking Twitter Trend Micro Specifications Security Cameras Workplace Strategies Lithium-ion battery Microchip Error Internet Exlporer Software as a Service Fraud Meta Username Social Engineering Entrepreneur Managing Costs Amazon Education Remote Computing eCommerce Black Friday SSID Virtual Assistant Outsource IT Mobile Computing Database Surveillance Search IT Technicians Virtual Machine Environment Media Tablet Undo

Blog Archive