Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

This feature has been an experimental add-on for quite some time, but it has since become an official feature of Gmail. To make things even better, it’s super easy to activate and use. All you have to do is click Settings in the top location of your Gmail inbox (under the gear button).

gmail in 1

Next, you’ll want to scroll halfway down the page. Find the Undo Send setting. This is what you’re looking for.

gmail in 2

Once you find it, you want to check the box, Enable Undo Send. There’s also a drop-down menu that gives you the choice of between 5, 10, 20, and 30 seconds where you’ll be able to take back your messages. If you tend to hesitate, the full 30 seconds will provide you with the maximum time required to make up your mind. Just make sure to click Save All Changes before giving it a shot.

Next time you send an email that might be somewhat unsavory, or to the completely wrong user, click Undo at the top of the mailbox. Keep in mind that if you wait too long, your message will be sent. If anything, it’s merely a safeguard against sending anything too salty for your work account. A lot of the time, the kinds of messages you want to take back are ones that can more easily be addressed in person or over the phone.

For more great tips from Voyage Technology, check back with our blog next week.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Quick Tips AI Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Compliance Cloud Computing Covid-19 Training Gadgets Outsourced IT Server Managed Service Provider Remote Work IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps Managed Services Apple Networking App Mobile Device Management BYOD Gmail WiFi Tip of the week Employer-Employee Relationship Chrome Budget Voice over Internet Protocol Hacker Managed IT Services Avoiding Downtime How To BDR Marketing HIPAA Computing Physical Security Applications Information Technology Access Control Office 365 Conferencing Computers Bring Your Own Device Healthcare Website Operating System Router Risk Management Virtual Private Network Big Data Health Help Desk Analytics 2FA Office Tips Augmented Reality Retail Storage Password Scam Data loss Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Firewall Vendor Management Cybercrime Solutions Display The Internet of Things Printer Paperless Office Infrastructure Monitoring Windows 11 Social Document Management Excel Managed IT Service Customer Service Remote Workers Telephone Presentation Mouse Licensing iPhone Entertainment Administration Wireless Technology Vulnerabilities Data Privacy Robot Images 101 Telephone System Word Cost Management Multi-Factor Authentication Mobility Settings Wireless Printing Content Filtering IT Management YouTube Meetings VPN Employees Safety Cryptocurrency Modem User Tip Integration Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Holidays Smart Technology Data Storage Outlook Supply Chain Machine Learning Video Conferencing Money Saving Time Customer Relationship Management Humor Managed Services Provider Virtual Machines Professional Services Maintenance Downloads Hacking Antivirus Sports SQL Server Technology Care Education Connectivity Social Engineering Break Fix Net Neutrality Browsers Financial Data History User Upload Business Communications Remote Computing Multi-Factor Security Smartwatch IT Mobile Computing Social Network Scams Azure Hybrid Work Tablet IoT Search Dark Web Procurement Telework IP Address Cyber security Best Practice Trends Tech Human Resources Alert Buisness File Sharing Regulations Dark Data Google Calendar CES Communitications Managed IT Customer Resource management Cables Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Supply Chain Management FinTech Recovery Business Growth Gamification Term Google Apps Notifications Staff Travel Social Networking Legislation IT Assessment Hard Drives IT Maintenance Domains Techology Fileless Malware Value Business Intelligence Google Maps Cortana Flexibility Organization Alt Codes Content Shortcuts Wearable Technology Downtime Unified Threat Management Motherboard Comparison Digital Security Cameras Smart Devices Refrigeration Health IT Ransmoware Public Speaking Unified Threat Management Directions Memory Vendors Hosted Solution Assessment Permissions Remote Working Lithium-ion battery Data Breach Typing Google Play Be Proactive Entrepreneur Network Congestion Specifications Videos Electronic Health Records Workforce Google Drive User Error Microchip Wasting Time Threats Internet Exlporer Knowledge Fraud Trend Micro Username Security Cameras Workplace Strategies Point of Sale 5G Black Friday Software as a Service Undo Meta Google Docs Managing Costs Amazon Unified Communications Database Experience eCommerce Bitcoin Network Management SSID Running Cable Tech Support IT Technicians Cookies Monitors Cyber Monday Surveillance Google Wallet Proxy Server Virtual Assistant Outsource IT Virtual Machine Environment Tactics Media Hotspot Reviews Application Windows 8 Medical IT Laptop Websites Mirgation Transportation Small Businesses Nanotechnology Development Drones IBM SharePoint Hypervisor Displays Addiction Electronic Medical Records Language Shopping Optimization Management PowerPoint Halloween Chatbots Employer/Employee Relationships Outsourcing Screen Reader Writing Distributed Denial of Service Lenovo PCI DSS Service Level Agreement Navigation Virtual Reality Computing Infrastructure Gig Economy Hacks Server Management Workplace Scary Stories Private Cloud Identity Teamwork Hiring/Firing Identity Theft Smart Tech Fun Internet Service Provider Competition Superfish Bookmark Regulations Compliance Deep Learning Download Evernote Paperless Twitter Alerts Memes Co-managed IT Error

Blog Archive