Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

This feature has been an experimental add-on for quite some time, but it has since become an official feature of Gmail. To make things even better, it’s super easy to activate and use. All you have to do is click Settings in the top location of your Gmail inbox (under the gear button).

gmail in 1

Next, you’ll want to scroll halfway down the page. Find the Undo Send setting. This is what you’re looking for.

gmail in 2

Once you find it, you want to check the box, Enable Undo Send. There’s also a drop-down menu that gives you the choice of between 5, 10, 20, and 30 seconds where you’ll be able to take back your messages. If you tend to hesitate, the full 30 seconds will provide you with the maximum time required to make up your mind. Just make sure to click Save All Changes before giving it a shot.

Next time you send an email that might be somewhat unsavory, or to the completely wrong user, click Undo at the top of the mailbox. Keep in mind that if you wait too long, your message will be sent. If anything, it’s merely a safeguard against sending anything too salty for your work account. A lot of the time, the kinds of messages you want to take back are ones that can more easily be addressed in person or over the phone.

For more great tips from Voyage Technology, check back with our blog next week.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 13 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Phishing Email Workplace Tips IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service Smartphones VoIP Android Business Management Mobile Devices Upgrade communications Disaster Recovery Data Recovery Browser Windows Social Media Managed IT Services Microsoft Office Remote Tech Term Current Events Network Productivity Internet of Things Artificial Intelligence Automation Facebook Gadgets AI Covid-19 Cloud Computing Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Holiday Information Spam Employee/Employer Relationship Compliance Encryption Training Office Windows 10 Business Continuity Government Data Management Bandwidth Business Technology Windows 10 Wi-Fi Blockchain Virtualization IT Support Apps Data Security Mobile Office Two-factor Authentication Vendor Networking Employer-Employee Relationship Chrome Budget Apple BYOD App Mobile Device Management Managed Services Voice over Internet Protocol Gmail Applications Office 365 How To BDR Hacker Conferencing Avoiding Downtime Marketing Access Control Computing Tip of the week Information Technology WiFi HIPAA Office Tips Analytics Managed IT Services Augmented Reality Help Desk Storage Password Computers Bring Your Own Device Website Virtual Private Network Health Operating System Healthcare Risk Management Retail Router Big Data Social Windows 7 Scam Data loss Microsoft 365 Solutions Monitoring Customer Service Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Telephone Display Going Green Printer Windows 11 Paperless Office Cooperation Infrastructure Firewall 2FA Cybercrime Remote Workers Excel Document Management The Internet of Things Free Resource Project Management Images 101 Modem User Tip Processor Outlook Mobile Security Multi-Factor Authentication Mobility Money Data Privacy Customer Relationship Management Humor Smart Technology Employees Robot Integration Sports Hacking Saving Time Presentation Mouse Wireless Technology IT Management Managed IT Service Administration VPN Meetings Holidays Downloads Data Storage Licensing Video Conferencing Computer Repair Entertainment Word Managed Services Provider Professional Services Settings Virtual Machines Printing Wireless Content Filtering Supply Chain YouTube Telephone System Cost Management Machine Learning Cryptocurrency iPhone Safety Vulnerabilities Maintenance Virtual Desktop Antivirus Data storage LiFi Windows 8 Social Engineering Laptop Scams Username Application IT Assessment Flexibility Drones Remote Computing Black Friday Value Hybrid Work Human Resources IBM Database Organization Smart Devices Halloween Cables Digital Security Cameras Tablet IT Technicians Cookies Remote Working Alert Cyber Monday Memory Proxy Server Google Play Google Apps Managed IT Tactics File Sharing Hotspot Data Breach Dark Data Electronic Health Records Hacks How To Scary Stories IT Maintenance Videos Mirgation Competition Nanotechnology Notifications Wasting Time Business Intelligence Fun Security Cameras Shortcuts Addiction Travel Language Trend Micro Deep Learning Software as a Service Ransmoware Techology Management Google Maps Chatbots Screen Reader Distributed Denial of Service Managing Costs Education Vendors SSID Be Proactive Service Level Agreement User Unified Threat Management Computing Infrastructure eCommerce Identity Surveillance Mobile Computing Virtual Assistant Workforce Unified Threat Management Bookmark Smart Tech Virtual Machine Threats Search Medical IT Workplace Strategies IP Address Download Reviews Alerts Best Practice Network Congestion Development Transportation Buisness Meta User Error Browsers Connectivity Legal Break Fix Hypervisor IT solutions Amazon PowerPoint Upload Shopping Recovery Point of Sale Optimization Business Growth Multi-Factor Security Employer/Employee Relationships Outsource IT Social Network Hard Drives Domains Network Management IoT PCI DSS Tech Support Dark Web Environment Navigation Cortana Media Trends Gig Economy Alt Codes Monitors Regulations Internet Service Provider Google Calendar Teamwork Downtime Small Businesses Customer Resource management Refrigeration Data Analysis Public Speaking Star Wars Regulations Compliance Websites Microsoft Excel Hosted Solution Displays Evernote Typing Lithium-ion battery Gamification Staff Memes Social Networking Net Neutrality Entrepreneur Electronic Medical Records Legislation SQL Server Outsourcing SharePoint Knowledge Fileless Malware Financial Data Google Drive History Writing Workplace Lenovo Content Smartwatch Wearable Technology IT Motherboard Procurement Virtual Reality Comparison Azure Hiring/Firing 5G Health IT Undo Experience Paperless Directions Server Management Assessment Telework Google Docs Private Cloud Permissions Cyber security Unified Communications Tech Bitcoin Running Cable Co-managed IT Superfish CES Identity Theft Communitications Supply Chain Management Google Wallet Twitter Specifications Technology Care Business Communications Microchip Internet Exlporer FinTech Error Fraud Term

Blog Archive