crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Labels and Filters
Gmail helps you keep your messages organized through the use of labels and filters. Basically, you can assign rules that will apply to any messages that you receive. By effectively using filters, you can make browsing your inbox more efficient, as well as consolidate similar messages with little effort.

For example, a filter could be used to assign a label to any message that holds “quarterly report” in the subject line. These labels would then be applied to any incoming messages that have that specific criteria.

Creating a Filter
To create a filter in Gmail, just follow these steps:

  • Click the down arrow in the search bar. You can then select specific details that you want to include in your search criteria.
  • Select the criteria that you want your filter to look for. Once you’ve done so, click on Create filter with this search.
  • You’ll then be provided with several options, one of which will automatically mark your conversation as important. Be sure to select the option to Apply the label.
  • Next, select the drop-down menu that’s labeled Choose label. You can then create a new label or one that has already been made.
  • Once the filter has been configured, select the Create Filter button.

Creating a Label
You can also apply labels to your messages, but in order to do so, you first need to make the label. You’ll be able to both apply labels as you receive messages, or apply them to existing messages. We’ll walk you through the process:

  • In Gmail, click on the More option on the left side of the screen.
  • Next, select Create new label.
  • Provide a name for your label and create it.

Now all you have to do is apply the label to your messages.

  • First, open up the message you want to apply the label to.
  • At the top of your screen, select the Label button. You can add a label to any group of messages provided you have selected them all before you click the label button.
  • You must then select each label you want to add. You can also create a new label at this point if you need to.

To learn more about how to take full control of your Gmail inbox, be sure to keep a lookout for similar articles from Integrated Business Technologies’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Hackers Backup Hosted Solutions Email Malware Mobile Devices IT Support Business Software Small Business Hardware Network Server Smartphones Data Communication Upgrade Business Continuity Windows Mobile Device Management VoIP Computer Efficiency Microsoft Office Disaster Recovery Google Virtualization Miscellaneous Mobile Office Vendor Management Social Media Holiday Innovation Gadgets Outsourced IT Quick Tips Passwords User Tips BYOD Mobile Computing Android Smartphone Browser Data Backup WiFi Windows 10 Internet of Things Remote Monitoring Network Security The Internet of Things Ransomware Bring Your Own Device Spam Best Practice Users Alert Managed IT services Data Management Wireless Technology Trending Operating System Apple Remote Computing Data Recovery Going Green Content Filtering Artificial Intelligence History Firewall App Big Data Unified Threat Management Office Analytics IT Solutions Lithium-ion Battery Save Money IT Consultant Printer Tech Support Information Technology Current Events Managed IT Gmail Maintenance Hard Drives Customer Relationship Management Encryption Windows 8 Cloud Computing Router Facebook Humor Tech Term Antivirus Saving Time Avoiding Downtime Employer-Employee Relationship Fax Server Website Customer Service Hacking Outlook Computers Health Cybersecurity Phone System Collaboration Two-factor Authentication Marketing Excel Automation Office Tips Retail Phishing Applications IT service Document Management Apps Application Digital Payment Mobile Device Virus Managed IT Services Business Growth VPN Risk Management Project Management User Error Tablet Government Co-Managed IT Office 365 Password iPhone Data Security Presentation Compliance Administration Augmented Reality Budget Regulations Inbound Marketing Bandwidth Proactive IT Recovery Computer Repair Money Mouse Infrastructure Running Cable Paperless Office Licensing Net Neutrality Social Chrome Training Wi-Fi PowerPoint Social Networking Alerts Display Statistics Internet Exlporer Competition Network Congestion Intranet Business Intelligence Smart Technology Files Downtime Mobile Security Mobility Search Virtual Desktop USB Scam Tip of the week Business Owner Piracy Hacker User Programming Sports Hosted Solution Point of Sale Analyitcs Flexibility Education Twitter Data storage Safety Vulnerability Specifications Settings Cost Management Robot Unified Communications Wireless IBM Cybercrime Productivity Save Time Printing End of Support LiFi File Sharing Redundancy HIPAA Hiring/Firing Computing Wearable Technology Help Desk Data loss People Deep Learning Gaming Console 5G Permissions PDF SaaS IT Technicians BDR Unified Threat Management PC Care Google Wallet Scary Stories Screen Reader Value Assessment Black Friday Writing Business Technology Fraud eBay Mirgation Remote Support Identity Theft Access Control Leadership Drones Buisness Skype Smart Tech Streaming Media Domains IT Management Cyber Monday New Additions Social Engineering Telephony Identities Print Server Fun Networking Text Messaging Storage Work Station Word SharePoint Backups CIO Adminstration LinkedIn Connectivity Public Speaking Network Management Congratulations Solid State Drive 3D Law Firm IT Cortana Video Surveillance eWaste Migration Recycling Downloads Legal Windows 8.1 Update Best Available IoT Windows 10 Distributed Denial of Service Environment Machine Learning Alt Codes Knowledge Techology Hotspot Chatbots Multi-Factor Security Samsung YouTube Star Wars Managed IT Service Troubleshooting Private Cloud Debate Typing Bluetooth Experience Disaster Resistance Language Identity Heating/Cooling Software Tips Google Calendar Google Drive Scheduling Online Currency Crowdfunding Utility Computing Server Management Break Fix Consumers How To Public Cloud Cryptocurrency IT Consulting Computing Infrastructure Computer Accessories Legislation Google Docs Healthcare IP Address Dark Web Sync Bitcoin Data Breach Cooperation Company Culture Motherboard Refrigeration Disaster communications Hard Drive Data Warehousing Staff Touchscreen Mobile Device Managment Hacks Modem IT Support Software as a Service Digital Signature Memory Cache Virtual Private Network Microsoft Excel Operations Macro Laptop Cookies Technology Tips Blockchain Documents Virtual Reality Entrepreneur Travel Technology Laws Halloween Nanotechnology Conferencing Undo Comparison Monitors

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...