Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating a New Google Account? Here’s How to Transfer Your Contacts

b2ap3_thumbnail_migrate_contacts_from_google_400.jpgDoes your organization use Google Apps for Business? It’s likely you use Google Contacts to store contacts. It’s an ideal tool for business professionals who are constantly on the move, but the real value that it presents is its instantaneous access to work contacts through Android devices. For this week’s tip, we’ll walk you through how to import and export your Google Contacts to a different Google, Outlook, or Apple account.

Continue reading
0 Comments

Tip of the Week: You Can Now Use Google Docs to Type With Your Voice

b2ap3_thumbnail_speech_to_text_400.jpgGoogle is no stranger to voice-related technology. Android smartphones have long had voice-to-text capabilities. Google Now allows users to search the Internet, set alarms, add calendar entries, activate entertainment, and so much more, all with your voice. Now, you can add editing and writing documents in Google Docs to that list.

Continue reading
0 Comments

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

Continue reading
0 Comments

Thanks to Google, Windows XP is About to Get Even More Risky to Use

b2ap3_thumbnail_google_ends_xp_support_400.jpgIt’s been over a year and a half since Microsoft gave up support on its extremely popular operating system, Windows XP. Without the necessary patches and security updates, Windows XP becomes a hazardous system to run for average users and business professionals. Now, things are about to get worse as Google cuts support for its popular web browser, Google Chrome, for Windows XP and several other older operating systems.

Continue reading
0 Comments

Tip of the Week: 3 Steps to Find Your Email Message in Gmail

b2ap3_thumbnail_search_gmail_400.jpgIf your business uses Gmail as its preferred email client, then you know that it’s a great way to keep communications running smoothly. Sometimes, however, a message might fall through the cracks, and you’ll need to locate it in order to acquire certain information. Gmail has made it easy to locate lost messages with their search feature.

Continue reading
0 Comments

Tip of the Week: Gmail Now Lets You Take Back a Sent Email!

b2ap3_thumbnail_gmail_undo_400.jpgHave you ever felt like you shouldn’t have sent that angry email? Do you second-guess yourself right before sending someone a stern talking-to? With Gmail’s new Undo Send feature, you have the opportunity to take back words that might not have been deserved, or simple mistakes that were meant for someone else. You have to think on your feet, though; the clock is ticking down every second you waste.

Continue reading
0 Comments

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Computer Workplace Tips Google Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Facebook Operating System The Internet of Things Social Media Microsoft Office Office Bandwidth Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Phishing App Smartphones Wireless Technology Android Mobile Computing Big Data communications Apple Safety Unified Threat Management Quick Tips Best Practice Alert Networking Firewall Data storage Data Windows Content Filtering Cybercrime Experience Website Mobile Device Management Money Network Employer-Employee Relationship History Managed Service Provider Two-factor Authentication Outlook Small Business Hosted Solution Windows XP IT Services Office 365 Documents Artificial Intelligence Tech Support Saving Money Compliance Analytics Drones intranet Lithium-ion battery Social Printer Retail Browser Social Networking Virtual Desktop Wireless Securty Public Speaking Unified Communications Document Management Managed IT services Encryption IP Address Virtualization Law Enforcement SaaS VoIP Government Proactive IT Bluetooth Cortana Augmented Reality Keyboard Search User Network Congestion Automation Hard Drives Save Money Shortcut Music Memory Remote Computing DDoS Deep Learning Laptop Heating/Cooling Word Cryptocurrency BDR IBM Google Docs Education Cleaning Vendor Management Holiday Business Management Black Market YouTube Processors Staffing Competition Office Tips LiFi BYOD Monitors Downtime Presentation Entrepreneur Passwords Streaming Media Help Desk Domains Disaster Micrsooft Visible Light Communication Displays Hacker Business Growth Data Management Recovery Application Robot Advertising Society End of Support Sports Customer Service Google Wallet Spam Running Cable Information Technology Windows 8 Writing Internet of Things Router
QR-Code