Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Your email inbox can quickly become an overwhelming mess without the proper management, but who has the time to sort through their email inbox on top of all of their other, more urgent responsibilities? Fortunately for Gmail users, the program provides the answer with its filter feature. For this week’s tip, we’ll show you how to regain control of your inbox with filters.

First, look to Gmail’s search bar at the top of the window and click the down arrow it has on its right side. A drop down will appear with numerous fields, allowing you to narrow your search. These fields include:

  • From, or the sender of the message
  • To, or the recipient of the message
  • Subject
  • Has the words
  • Doesn’t have

These fields end with checkboxes allowing you to include messages with attachments in your search, and the ability to omit chat messages. You can also search based on message size and the date received.

Once these fields are filled out, you’ll be given the option to Create filter with this search, from which you can further customize the filter with more options. Once you’ve finished, click Create Filter.

You can also use a specific message to create a filter. Use the checkbox to identify the message that will inform the filter and click the More button that is above the message. You’ll be given the option to Filter messages like these and a few additional properties to assign to the filter.

If you need to return to a filter to edit it, access Settings via the gear icon in the right corner of the window to find Filters and Blocked Addresses. Out of the list of every filter you’ve created, select the one you’re ready to edit and make your changes, or delete the filter outright.

How likely is it that you’ll start to use these filters? Let us know in the comments, and make sure you subscribe to this blog for more tips!

Software as a Service Is Helping Small Businesses
Would Your Users Fall For These Social Engineering...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 16 December 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Managed Service Provider Workplace Tips Business Computing Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Gadgets Quick Tips Smartphones Small Business Business Continuity User Tips Mobile Devices Mobile Office Computer Disaster Recovery Network Security Network Virtualization Microsoft Office Server VoIP Miscellaneous Upgrade Social Media Windows 10 Unified Threat Management Mobile Device Management Windows Ransomware Smartphone Android Operating System Remote Computing Passwords Innovation WiFi Vendor Management BYOD Remote Monitoring Communication Apps Facebook Holiday Mobile Computing Collaboration Marketing The Internet of Things Users History Firewall Managed IT services Analytics Data Management Apple IT Support Phishing Save Money Outsourced IT Alert IT Consultant Bring Your Own Device Managed IT Services Office Productivity Health Automation Gmail Big data Content Filtering Windows 8 Wireless Technology Search Tech Support Hiring/Firing Lithium-ion Battery Browser Outlook Hard Drives Virus Artificial Intelligence communications Managed IT App Budget Best Practice BDR Spam Going Green Cybersecurity Internet of Things Printer Update Money Encryption Recovery Employer-Employee Relationship Help Desk Antivirus Maintenance Data Backup Phone System Information Technology IBM Mobile Device Travel Document Management Education Saving Time SaaS Humor Save Time Bandwidth Office 365 Running Cable Government Proactive IT Computers Administration Cost Management Law Enforcement Data storage Customer Service It Management Legal Hard Drive Website Fax Server Mobility Computer Repair Hosted Solution Hacking Windows 10 Intranet Avoiding Downtime User Black Market Current Events Digital Payment Data Recovery Networking DDoS Comparison Telephone Systems PowerPoint Training Word Social Networking Risk Management Disaster VPN Password Twitter Securty Hacker Project Management Solid State Drive Tablet Flexibility iPhone Business Intelligence Two-factor Authentication Wireless Office Tips Trending Paperless Office Lifestyle Automobile Sports Scam Retail Computing Statistics Experience How To Robot IT service Streaming Media Compliance Inbound Marketing Social Engineering Start Menu Taxes Software as a Service Chrome Safety Access Control Pain Points Specifications Uninterrupted Power Supply Social Excel User Error Business Growth Router Computer Accessories Telephony Monitors Network Congestion Customer Relationship Management Augmented Reality Patch Management Google Maps YouTube Mouse Cybercrime Gaming Console Settings Unified Communications Text Messaging Webcam Cloud Computing End of Support Hack Cortana Downtime Processors Politics USB Presentation Company Culture Net Neutrality Distributed Denial of Service Virtual Desktop Laptop Google Docs Public Cloud Co-managed IT Programming Documents Heating/Cooling CIO Video Surveillance Business Technology Microchip Storage WannaCry Regulations LinkedIn Computer Malfunction Windows XP Saving ZTime Downloads Reading PDF Keyboard Time Management Best Available Society Debate Domains Harddrive Hacks Micrsooft Product Reviews Archive Read Motion Sickness Google Calendar Relocation eWaste Shortcut Touchscreen External Harddrive Identity Theft Value Tracking Point of Contact Knowledge Notifications Troubleshooting Digital Web Server Staffing Thin CLient Technology Tips Reliable Computing Environment Competition Websites Smart Phones Virtual Reality Workers Get More Done Music Freedom of Information Tech Terms Business Owner Printer Server Upgrades Access Bluetooth LiFi Leadership Application Computing Infrastructure Samsung News G Suite Device Management Rental Service Deep Learning Spyware Memory Physical Security Visible Light Communication Wi-Fi Digital Signature Tablets Fake News online Currency Sync Data Security Upselling Entertainment Data Protection Webinar cache Flash CCTV Advertising Mobile Technology Google Wallet Microsoft Excel Analytic In Internet of Things Data Loss Corporate Profile Displays Assessment Emails Mobile Payment Public Speaking GPS Redundancy Banking Best Practives Drones Scalability Data Breach File Sharing VoIP Entrepreneur Consultation Microserver Language Meetings Permissions Television Ebay 3D Business Metrics HIPAA Cabling Business Managemenet Private Cloud Writing Administrator switches Recycling Audit Electronic Payment Turn Key Supercomputer SharePoint Pirating Information IP Address Adminstration Emergency Chromebook Worker Trojan Machine Learning Organize Human Resources Computer Care Messenger Google Drive Work/Life Balance Employer Employee Relationship Cryptocurrency Download Licensing Skype Content Management Botnet IT consulting Printing Books Electricity Teamwork Cleaning Windows Server 2008 CrashOverride Windows 7 Capital Productuvuty Evernote Vulnerability 3D Printing Data Warehousing

hp supplies medallionLarge2017