Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating a New Google Account? Here’s How to Transfer Your Contacts

b2ap3_thumbnail_migrate_contacts_from_google_400.jpgDoes your organization use Google Apps for Business? It’s likely you use Google Contacts to store contacts. It’s an ideal tool for business professionals who are constantly on the move, but the real value that it presents is its instantaneous access to work contacts through Android devices. For this week’s tip, we’ll walk you through how to import and export your Google Contacts to a different Google, Outlook, or Apple account.

Continue reading
0 Comments

Tip of the Week: You Can Now Use Google Docs to Type With Your Voice

b2ap3_thumbnail_speech_to_text_400.jpgGoogle is no stranger to voice-related technology. Android smartphones have long had voice-to-text capabilities. Google Now allows users to search the Internet, set alarms, add calendar entries, activate entertainment, and so much more, all with your voice. Now, you can add editing and writing documents in Google Docs to that list.

Continue reading
0 Comments

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

Continue reading
0 Comments

Thanks to Google, Windows XP is About to Get Even More Risky to Use

b2ap3_thumbnail_google_ends_xp_support_400.jpgIt’s been over a year and a half since Microsoft gave up support on its extremely popular operating system, Windows XP. Without the necessary patches and security updates, Windows XP becomes a hazardous system to run for average users and business professionals. Now, things are about to get worse as Google cuts support for its popular web browser, Google Chrome, for Windows XP and several other older operating systems.

Continue reading
0 Comments

Tip of the Week: 3 Steps to Find Your Email Message in Gmail

b2ap3_thumbnail_search_gmail_400.jpgIf your business uses Gmail as its preferred email client, then you know that it’s a great way to keep communications running smoothly. Sometimes, however, a message might fall through the cracks, and you’ll need to locate it in order to acquire certain information. Gmail has made it easy to locate lost messages with their search feature.

Continue reading
0 Comments

Tip of the Week: Gmail Now Lets You Take Back a Sent Email!

b2ap3_thumbnail_gmail_undo_400.jpgHave you ever felt like you shouldn’t have sent that angry email? Do you second-guess yourself right before sending someone a stern talking-to? With Gmail’s new Undo Send feature, you have the opportunity to take back words that might not have been deserved, or simple mistakes that were meant for someone else. You have to think on your feet, though; the clock is ticking down every second you waste.

Continue reading
0 Comments

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Efficiency Workplace Tips Computer Google Hosted Solutions Microsoft Upgrade Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail The Internet of Things Social Media Microsoft Office Office Bandwidth Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System Apple Quick Tips Best Practice Alert Firewall Networking Data storage Content Filtering Cybercrime Data Windows Smartphones Website Experience Money Employer-Employee Relationship Mobile Device Management Network History Two-factor Authentication Managed Service Provider Small Business Outlook Phishing App Mobile Computing Big Data Wireless Technology communications Safety Android Unified Threat Management Monitors Virtual Desktop IP Address Wireless Virtualization Unified Communications Securty Encryption Government Document Management Displays Law Enforcement SaaS Augmented Reality VoIP Keyboard Search User Proactive IT Hard Drives Cortana End of Support Network Congestion Remote Computing Shortcut Save Money DDoS Music Heating/Cooling Word Writing Laptop Cryptocurrency IBM Business Management Google Docs Education Holiday Competition Cleaning Black Market YouTube Presentation Processors Entrepreneur Retail Office Tips LiFi Domains Staffing Downtime BYOD Passwords Streaming Media Hacker Help Desk Managed IT services Micrsooft Visible Light Communication Disaster Application Business Growth Data Management Customer Service Bluetooth Robot Advertising Recovery Sports Society Automation Google Wallet Spam Router Memory Information Technology Office 365 Running Cable Internet of Things Windows 8 Deep Learning Hosted Solution Windows XP Analytics IT Services Saving Money intranet BDR Artificial Intelligence Lithium-ion battery Documents Compliance Tech Support Vendor Management Drones Social Networking Social Browser Public Speaking Printer
QR-Code