Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating a New Google Account? Here’s How to Transfer Your Contacts

b2ap3_thumbnail_migrate_contacts_from_google_400.jpgDoes your organization use Google Apps for Business? It’s likely you use Google Contacts to store contacts. It’s an ideal tool for business professionals who are constantly on the move, but the real value that it presents is its instantaneous access to work contacts through Android devices. For this week’s tip, we’ll walk you through how to import and export your Google Contacts to a different Google, Outlook, or Apple account.

Continue reading
0 Comments

Tip of the Week: You Can Now Use Google Docs to Type With Your Voice

b2ap3_thumbnail_speech_to_text_400.jpgGoogle is no stranger to voice-related technology. Android smartphones have long had voice-to-text capabilities. Google Now allows users to search the Internet, set alarms, add calendar entries, activate entertainment, and so much more, all with your voice. Now, you can add editing and writing documents in Google Docs to that list.

Continue reading
0 Comments

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

Continue reading
0 Comments

Thanks to Google, Windows XP is About to Get Even More Risky to Use

b2ap3_thumbnail_google_ends_xp_support_400.jpgIt’s been over a year and a half since Microsoft gave up support on its extremely popular operating system, Windows XP. Without the necessary patches and security updates, Windows XP becomes a hazardous system to run for average users and business professionals. Now, things are about to get worse as Google cuts support for its popular web browser, Google Chrome, for Windows XP and several other older operating systems.

Continue reading
0 Comments

Tip of the Week: 3 Steps to Find Your Email Message in Gmail

b2ap3_thumbnail_search_gmail_400.jpgIf your business uses Gmail as its preferred email client, then you know that it’s a great way to keep communications running smoothly. Sometimes, however, a message might fall through the cracks, and you’ll need to locate it in order to acquire certain information. Gmail has made it easy to locate lost messages with their search feature.

Continue reading
0 Comments

Tip of the Week: Gmail Now Lets You Take Back a Sent Email!

b2ap3_thumbnail_gmail_undo_400.jpgHave you ever felt like you shouldn’t have sent that angry email? Do you second-guess yourself right before sending someone a stern talking-to? With Gmail’s new Undo Send feature, you have the opportunity to take back words that might not have been deserved, or simple mistakes that were meant for someone else. You have to think on your feet, though; the clock is ticking down every second you waste.

Continue reading
0 Comments

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Hosted Solutions Microsoft Upgrade Computer Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Network Security Ransomware Hardware Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Operating System Facebook The Internet of Things Social Media Bandwidth Experience Firewall Content Filtering Cybercrime Mobile Device Management Money Network Website Managed Service Provider Outlook Employer-Employee Relationship Wireless Technology History Two-factor Authentication Android Small Business Phishing Apple App Best Practice Mobile Computing Big Data communications Safety Alert Unified Threat Management Networking Data storage Quick Tips Smartphones Data Windows Education User Google Docs Search Retail Cleaning Hard Drives Holiday Processors Black Market Remote Computing YouTube Shortcut DDoS LiFi Staffing Office Tips Managed IT services BYOD Heating/Cooling Downtime Word Help Desk Passwords Streaming Media Visible Light Communication Disaster Micrsooft Bluetooth Business Management Business Growth Data Management Advertising Competition Recovery Robot Automation Memory Society Presentation Sports Entrepreneur Google Wallet Domains Spam Information Technology Running Cable Deep Learning BDR Windows 8 Hacker Internet of Things IT Services Hosted Solution Windows XP Artificial Intelligence Application Documents Vendor Management Tech Support Customer Service Compliance Drones Monitors Social Printer Browser Router Wireless Office 365 Virtual Desktop Displays Unified Communications Securty Saving Money Document Management Analytics Encryption VoIP intranet Law Enforcement Lithium-ion battery SaaS End of Support Proactive IT Cortana Social Networking Network Congestion Writing Save Money Public Speaking Music IP Address Virtualization Cryptocurrency Laptop Government Augmented Reality Keyboard IBM
QR-Code