094 90 48200    Get SUPPORT

Aniar IT Services Blog

Tip of the Week: Keep Track of Your Priority Gmails

Tip of the Week: Keep Track of Your Priority Gmails

Email is undeniably a useful tool, but it can be a real drag on productivity and a hindrance to manage. Then again, there are some messages that you absolutely need to keep track of as they contain sensitive information. Gmail makes keeping messages under your thumb simple.

Email Can Be Frustrating

Gmail offers a lot of tools to help people organize their email. Features such as filters and labels make dealing with the loads of mail that come in easier, but still some messages might slip through the cracks. Wouldn’t it be useful if your email platform could give you a second chance to be alerted to a direct email? Users can now use a simple trick to reorder messages, so the most urgent ones appear at the top of your inbox. Let’s take you through it. 

Snoozing Your High-Priority Messages

So you’ve identified an important message that you want to return to after you deal with the mountain of other messages. Gmail allows you to do this with the use of the Snooze button.

Unfortunately, it doesn’t really work like your favorite snooze button on your alarm clock. Gmail’s snooze button is simply to resend yourself an email later so that the priority messages are at the top. Here’s how to access this feature:

  • (On a desktop/laptop) selecting the box next to it and clicking the clock-shaped icon at the top of the window.
  • (In the mobile app) tapping on the icon at its left, accessing the three-dot menu, and selecting Snooze.

Once this is done, a prompt will appear that will allow you to set when the message should return. The Pick date & time option allows you to set anytime after now for you to get the message back. Once you send this message, it will come back and sit at the top of your inbox in orange. It is extremely useful for the person who gets a lot of emails, but doesn’t get a lot of important emails. 

For more great tips and tricks, return to our blog regularly. 

Are Utilities as Secure as They Should Be?
Checking a Website's Safety from Its Google Result
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Google Cloud Email Efficiency Privacy User Tips Network Security Workplace Tips Internet IT Support Data Mobile Device Hackers Hosted Solutions Innovation Software Communication Microsoft Collaboration Android Business Hardware Small Business Users VoIP Data Recovery Data Backup Smartphone Smartphones IT Services Managed IT Services Phishing Cybersecurity Windows 10 Computer Cloud Computing Network Communications Backup Mobile Devices Tech Term Malware Gadgets Miscellaneous Quick Tips Managed Service Windows Browser Outsourced IT Business Continuity Disaster Recovery Saving Money Business Management Internet of Things Artificial Intelligence Upgrade Covid-19 Passwords BDR Spam Information Facebook Save Money Chrome Microsoft Office Server Office 365 Social Media Holiday Router Paperless Office How To Operating System BYOD Blockchain Automation Wi-Fi Computers Data Security Apps Data Storage Applications Encryption Infrastructure Human Resources Mobile Office Windows 7 Government Patch Management Networking Word Cybercrime Ransomware Virtualization Health Money Connectivity Telephone System Vendor Managed IT Big Data Machine Learning Display Vulnerability Software as a Service Managed Services Bandwidth Remote Work Staff Information Technology Mobile Device Management History Remote Two-factor Authentication Data Protection Remote Monitoring HIPAA Settings Data Breach Vendor Management Identity Theft Google Docs Hard Drive Unsupported Software Law Enforcement Net Neutrality Servers Telephony Office Scam Access Control Sports Education Managed Services Provider Help Desk Spam Blocking Business Intelligence CES Update Website Compliance Digital Signage Procurement Fraud Cryptocurrency Botnet Bring Your Own Device Keyboard IT Management Content Management Training Managed IT services Employee/Employer Relationship App VPN Wireless Redundancy Meetings Voice over Internet Protocol Password Conferencing Telephone Systems Google Drive Social Engineering Virtual Assistant Audit Avoiding Downtime WiFi Processor Private Cloud IT Plan Business Technology Printing Augmented Reality Comparison OneNote 5G Business Mangement Smart Tech Going Green Digital Signature Printers Virtual Reality Professional Services Employees Flash Google Apps Password Management Social Development Public Cloud Value Workforce Electronic Medical Records Wire Firewall Managed IT Service Procedure Bing ROI Personal Mobile The Internet of Things Specifications Addiction MSP Project Management Quick Tip Hacker Tip of the week Online Shopping Data loss Trending Gmail Employee Saving Time Computer Fan Credit Cards PDF Entertainment Warranty Cabling Fiber Optics Sales HaaS Workers NIST Messaging Software Tips Data Management Unified Threat Management FinTech Cleaning HVAC GDPR Digitize File Sharing ISP Bitcoin Regulations Windows Server 2008 Evernote Cortana Alert Recycling Devices Supply Chain Management HBO FENG Printer Cables Trend Micro SharePoint Authentication SMS Customer Service Telecommuting Mobile Computing OLED Using Data Apple Computer Care Practices Remote Computing IT Assessment Cache Cryptomining Batteries PCI DSS Skype eWaste Thought Leadership Google Search Outlook Amazon YouTube Mouse Default App Shopping End of Support Safe Mode Security Cameras Virtual Machine AI Solid State Drive Travel Smart Office Biometric Security Downtime Charger Hosted Computing Shortcuts Windows Server 2008 R2 OneDrive Windows 10s Tools Work/Life Balance Wireless Internet Remote Worker Database Virtual Private Network Start Menu Screen Mirroring Legal Save Time Frequently Asked Questions Recovery Amazon Web Services Accountants Microchip IT Infrastructure Social Network Customer relationships Employer-Employee Relationship Sync Multi-Factor Security Password Manager Nanotechnology Smartwatch Hypervisor Physical Security Document Management Camera Manufacturing Computing RMM Root Cause Analysis Wireless Charging Inventory Enterprise Content Management Mobility Copiers Millennials USB Wiring Remote Workers Policy Virtual Desktop Cast Criminal Twitter Proactive IT Peripheral Excel Search Engine Investment Wireless Technology Tech Support Safety Hard Drives IBM Productivity Marketing Search Budget Competition Personal Information Customer Relationship Management IP Address CrashOverride Financial Emergency Managed Service Provider Domains Regulation Hiring/Firing Windows 10 Public Speaking Fun Company Culture Presentation Lithium-ion battery Managing Stress