crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Labels and Filters
Gmail helps you keep your messages organized through the use of labels and filters. Basically, you can assign rules that will apply to any messages that you receive. By effectively using filters, you can make browsing your inbox more efficient, as well as consolidate similar messages with little effort.

For example, a filter could be used to assign a label to any message that holds “quarterly report” in the subject line. These labels would then be applied to any incoming messages that have that specific criteria.

Creating a Filter
To create a filter in Gmail, just follow these steps:

  • Click the down arrow in the search bar. You can then select specific details that you want to include in your search criteria.
  • Select the criteria that you want your filter to look for. Once you’ve done so, click on Create filter with this search.
  • You’ll then be provided with several options, one of which will automatically mark your conversation as important. Be sure to select the option to Apply the label.
  • Next, select the drop-down menu that’s labeled Choose label. You can then create a new label or one that has already been made.
  • Once the filter has been configured, select the Create Filter button.

Creating a Label
You can also apply labels to your messages, but in order to do so, you first need to make the label. You’ll be able to both apply labels as you receive messages, or apply them to existing messages. We’ll walk you through the process:

  • In Gmail, click on the More option on the left side of the screen.
  • Next, select Create new label.
  • Provide a name for your label and create it.

Now all you have to do is apply the label to your messages.

  • First, open up the message you want to apply the label to.
  • At the top of your screen, select the Label button. You can add a label to any group of messages provided you have selected them all before you click the label button.
  • You must then select each label you want to add. You can also create a new label at this point if you need to.

To learn more about how to take full control of your Gmail inbox, be sure to keep a lookout for similar articles from Integrated Business Technologies’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 17 August 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Best Practices Business Computing Saving Money Productivity IT Services Workplace Tips Hosted Solutions Hackers Backup Malware Email Software Mobile Devices Business IT Support Data Hardware Small Business Network Communication Server Smartphones Upgrade VoIP Windows Computer Business Continuity Google Efficiency Mobile Device Management Microsoft Office Disaster Recovery Virtualization Innovation Vendor Management Miscellaneous Mobile Office Gadgets Social Media Holiday Quick Tips Passwords Data Backup Tech Term BYOD Outsourced IT Network Security Android Smartphone User Tips Mobile Computing WiFi Bring Your Own Device Browser Windows 10 Internet of Things Managed IT services Best Practice Spam Ransomware Remote Monitoring The Internet of Things Apple Users Remote Computing Wireless Technology Alert Data Recovery Trending Data Management Operating System Firewall Content Filtering Artificial Intelligence History Unified Threat Management Gmail Going Green Save Money Encryption App Customer Relationship Management Managed IT Router Printer Tech Support Analytics Big Data IT Solutions Lithium-ion Battery Facebook Office Information Technology Current Events IT Consultant Avoiding Downtime Antivirus Maintenance Document Management Hard Drives Cloud Computing Paperless Office Windows 8 Employer-Employee Relationship Productivity Applications IT Support Humor Saving Time Collaboration Two-factor Authentication Virus Compliance Automation Cybersecurity Office Tips Fax Server Retail Digital Payment Phishing Bandwidth Mobile Device Outlook Health VPN IT service Risk Management Chrome Business Growth Wi-Fi Marketing Excel Website Customer Service Hacking Computers Phone System Managed IT Services Apps Application Budget Mouse Project Management Regulations Net Neutrality Recovery Social User Error Money Co-Managed IT Running Cable File Sharing PowerPoint Licensing Social Networking Data Security Tablet Unified Communications Infrastructure Inbound Marketing iPhone Office 365 Password Administration Augmented Reality Government Managed Service Presentation Proactive IT Training Computer Repair Point of Sale Business Owner Company Culture Files Twitter Hacker Help Desk User Programming Internet Exlporer Storage Mobility Smart Technology IBM Analyitcs Education Mobile Security IoT Safety Specifications Hosted Solution Wearable Technology Settings Flexibility Cost Management Wireless Data storage Alerts Cybercrime Save Time Tip of the week Display Robot Hiring/Firing Printing Scam End of Support LiFi Intranet Business Intelligence Computing Statistics Recycling Competition Network Congestion Vulnerability eWaste Downtime Data loss Blockchain Piracy HIPAA BDR Search Sports Virtual Desktop USB Redundancy Samsung Screen Reader Identity Theft Black Friday Legal Troubleshooting Debate Mobile Assessment Fraud Experience Access Control Heating/Cooling Alt Codes Proactive Mirgation Crowdfunding Smart Tech Cyber Monday Consumers Gaming Console Touchscreen YouTube Managing Stress IT Management Machine Learning SharePoint Typing Remote Monitoring and Management Business Technology Connectivity IP Address Google Drive Enterprise Content Management Network Management How To Private Cloud Downloads Refrigeration Cryptocurrency Disaster WPA3 Networking Migration Distributed Denial of Service Google Docs Vulnerabilities Windows 10 Hotspot Public Cloud Multi-Factor Security Conferencing Bitcoin Digital Signature Fleet Tracking Chatbots Memory Star Wars Software Tips Managed IT Service Adminstration 3D communications PC Care Geography Language Laptop Identity Sync Google Calendar Value Hacks Asset Tracking Utility Computing Break Fix eBay Documents Techology Remote Support Entrepreneur Leadership High-Speed Internet Server Management Computing Infrastructure Halloween Skype Mobile Device Managment Legislation Streaming Media Undo New Additions OneNote People Healthcare Dark Web Print Server 5G Text Messaging PDF Virtual Reality Disaster Resistance Work Station Development Cooperation Scary Stories Motherboard LinkedIn Scheduling Congratulations Employee-Employer Relationship Hard Drive Data Warehousing Law Firm IT Monitors Video Surveillance SaaS IT Consulting Deep Learning Cables Patch Management Staff Windows 8.1 Update Modem Best Available G Suite Software as a Service Domains Google Wallet Remote Workers Cache Microsoft Excel Fun Writing Chromebook Data Breach Word Wires Operations Cookies Travel Technology Tips Public Speaking Drones Buisness Management Bluetooth Cortana Social Engineering Technology Laws Identities Virtual Private Network Online Currency Nanotechnology Comparison Backups Environment CIO Enterprise Resource Planning How To Permissions Knowledge Computer Accessories Telephony Unified Threat Management Solid State Drive Macro MSP IT Technicians

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...