Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating a New Google Account? Here’s How to Transfer Your Contacts

b2ap3_thumbnail_migrate_contacts_from_google_400.jpgDoes your organization use Google Apps for Business? It’s likely you use Google Contacts to store contacts. It’s an ideal tool for business professionals who are constantly on the move, but the real value that it presents is its instantaneous access to work contacts through Android devices. For this week’s tip, we’ll walk you through how to import and export your Google Contacts to a different Google, Outlook, or Apple account.

Continue reading
0 Comments

Tip of the Week: You Can Now Use Google Docs to Type With Your Voice

b2ap3_thumbnail_speech_to_text_400.jpgGoogle is no stranger to voice-related technology. Android smartphones have long had voice-to-text capabilities. Google Now allows users to search the Internet, set alarms, add calendar entries, activate entertainment, and so much more, all with your voice. Now, you can add editing and writing documents in Google Docs to that list.

Continue reading
0 Comments

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

Continue reading
0 Comments

Thanks to Google, Windows XP is About to Get Even More Risky to Use

b2ap3_thumbnail_google_ends_xp_support_400.jpgIt’s been over a year and a half since Microsoft gave up support on its extremely popular operating system, Windows XP. Without the necessary patches and security updates, Windows XP becomes a hazardous system to run for average users and business professionals. Now, things are about to get worse as Google cuts support for its popular web browser, Google Chrome, for Windows XP and several other older operating systems.

Continue reading
0 Comments

Tip of the Week: 3 Steps to Find Your Email Message in Gmail

b2ap3_thumbnail_search_gmail_400.jpgIf your business uses Gmail as its preferred email client, then you know that it’s a great way to keep communications running smoothly. Sometimes, however, a message might fall through the cracks, and you’ll need to locate it in order to acquire certain information. Gmail has made it easy to locate lost messages with their search feature.

Continue reading
0 Comments

Tip of the Week: Gmail Now Lets You Take Back a Sent Email!

b2ap3_thumbnail_gmail_undo_400.jpgHave you ever felt like you shouldn’t have sent that angry email? Do you second-guess yourself right before sending someone a stern talking-to? With Gmail’s new Undo Send feature, you have the opportunity to take back words that might not have been deserved, or simple mistakes that were meant for someone else. You have to think on your feet, though; the clock is ticking down every second you waste.

Continue reading
0 Comments

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Hosted Solutions Microsoft Computer Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Network Security Ransomware Hardware Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Operating System Hacking WiFi Facebook The Internet of Things Social Media Bandwidth Firewall Mobile Device Management Money Network Content Filtering Cybercrime Managed Service Provider Outlook Website Wireless Technology Android Employer-Employee Relationship Apple History Two-factor Authentication Small Business Best Practice Phishing App Alert Smartphones Networking Mobile Computing Data storage Big Data communications Safety Windows Unified Threat Management Data Experience Quick Tips BYOD Search Downtime User Streaming Media Hard Drives Help Desk Automation Passwords Micrsooft Visible Light Communication Remote Computing Disaster Shortcut Memory DDoS Data Management Heating/Cooling Word Deep Learning Business Growth Robot Advertising Recovery BDR Society Sports Google Wallet Spam Business Management Vendor Management Information Technology Running Cable Internet of Things Competition Windows 8 Hosted Solution Windows XP Presentation IT Services Entrepreneur Monitors Artificial Intelligence Domains Documents Compliance Tech Support Drones Hacker Displays Social Browser Application Printer Virtual Desktop Customer Service Wireless End of Support Unified Communications Securty Encryption Document Management Law Enforcement SaaS VoIP Router Writing Office 365 Cortana Proactive IT Network Congestion Analytics Saving Money intranet Save Money Lithium-ion battery Music Retail Social Networking Cryptocurrency Laptop Public Speaking IBM Google Docs Education IP Address Virtualization Managed IT services Cleaning Holiday YouTube Processors Government Black Market Office Tips LiFi Augmented Reality Staffing Keyboard Bluetooth
QR-Code