crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Labels and Filters
Gmail helps you keep your messages organized through the use of labels and filters. Basically, you can assign rules that will apply to any messages that you receive. By effectively using filters, you can make browsing your inbox more efficient, as well as consolidate similar messages with little effort.

For example, a filter could be used to assign a label to any message that holds “quarterly report” in the subject line. These labels would then be applied to any incoming messages that have that specific criteria.

Creating a Filter
To create a filter in Gmail, just follow these steps:

  • Click the down arrow in the search bar. You can then select specific details that you want to include in your search criteria.
  • Select the criteria that you want your filter to look for. Once you’ve done so, click on Create filter with this search.
  • You’ll then be provided with several options, one of which will automatically mark your conversation as important. Be sure to select the option to Apply the label.
  • Next, select the drop-down menu that’s labeled Choose label. You can then create a new label or one that has already been made.
  • Once the filter has been configured, select the Create Filter button.

Creating a Label
You can also apply labels to your messages, but in order to do so, you first need to make the label. You’ll be able to both apply labels as you receive messages, or apply them to existing messages. We’ll walk you through the process:

  • In Gmail, click on the More option on the left side of the screen.
  • Next, select Create new label.
  • Provide a name for your label and create it.

Now all you have to do is apply the label to your messages.

  • First, open up the message you want to apply the label to.
  • At the top of your screen, select the Label button. You can add a label to any group of messages provided you have selected them all before you click the label button.
  • You must then select each label you want to add. You can also create a new label at this point if you need to.

To learn more about how to take full control of your Gmail inbox, be sure to keep a lookout for similar articles from Integrated Business Technologies’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Mobile Devices Software Data IT Support Hardware Small Business Network Communication Server Smartphones VoIP Computer Upgrade Google Windows Efficiency Business Continuity Mobile Device Management Innovation Disaster Recovery Virtualization Microsoft Office Miscellaneous Mobile Office Vendor Management Data Backup Tech Term Outsourced IT Holiday Gadgets Social Media BYOD User Tips Quick Tips Passwords Network Security Mobile Computing Android Smartphone Browser WiFi Bring Your Own Device Productivity Internet of Things Managed IT services Windows 10 The Internet of Things Best Practice Ransomware Spam Data Recovery Remote Monitoring Data Management Save Money Trending Operating System Apple Users Remote Computing Artificial Intelligence Wireless Technology Alert Office Collaboration Going Green Firewall Content Filtering Customer Relationship Management History Gmail Unified Threat Management Encryption Router Big Data Printer Tech Support Analytics IT Solutions Lithium-ion Battery Facebook Information Technology Current Events IT Consultant Cloud Computing Managed IT App IT Support Humor Two-factor Authentication Paperless Office Saving Time Avoiding Downtime Antivirus Phishing Document Management Maintenance Hard Drives Mobile Device Applications Windows 8 Employer-Employee Relationship Website Computers Bandwidth Project Management Phone System Cybersecurity Apps Automation Application Virus Office Tips Retail Fax Server IT service Digital Payment Outlook Chrome Health Business Growth Government VPN Wi-Fi Risk Management Managed IT Services Compliance Marketing Customer Service Excel Hacking Regulations Password Files Inbound Marketing iPhone Administration Presentation Augmented Reality Budget Unified Communications Proactive IT Training Computer Repair Point of Sale Recovery Data Security Mouse Money Help Desk Social User Error Net Neutrality Running Cable Licensing Healthcare Infrastructure Co-Managed IT File Sharing PowerPoint Social Networking Tablet Managed Service Office 365 Scam Redundancy Intranet Competition Business Intelligence Network Congestion Machine Learning Recycling eWaste Downtime Internet Exlporer Flexibility Hosted Solution Storage Data storage Mobility Smart Technology Search Mobile Security USB Piracy Virtual Desktop Business Owner Robot IoT Windows 10 Sports Hacker Printing End of Support User Programming Tip of the week LiFi Company Culture Analyitcs Twitter Computing Education Safety Specifications IBM Settings Cost Management Wireless Save Time Cybercrime Wearable Technology Remote Workers Conferencing Hiring/Firing Vulnerability Display Alerts Information Data loss Blockchain HIPAA BDR Statistics How To Permissions Print Server Text Messaging YouTube Enterprise Resource Planning MSP Domains IT Technicians Unified Threat Management Work Station Typing Google Drive Scheduling Congratulations Fun Screen Reader LinkedIn Identity Theft Black Friday Assessment Fraud Law Firm IT How To Video Surveillance Mobile Word Proactive Public Speaking Mirgation Consulting Windows 8.1 Update Access Control Cryptocurrency Google Docs Cortana Smart Tech Best Available Cyber Monday IT Management Managing Stress Remote Monitoring and Management Business Technology Managed Services Provider Private Cloud SharePoint Bitcoin Knowledge Connectivity Environment Network Management Bluetooth communications Enterprise Content Management WPA3 Migration E-Commerce Online Currency Public Cloud Downloads Samsung Hacks Experience Troubleshooting Distributed Denial of Service Debate Hotspot Networking Computer Accessories Vulnerabilities Heating/Cooling Fleet Tracking Chatbots Features Consumers Sync Multi-Factor Security Crowdfunding Macro Star Wars Software Tips Managed IT Service Language Virtual Reality Geography Asset Tracking IP Address Identity Electronic Health Records Mobile Device Managment Google Calendar Monitors Utility Computing Break Fix High-Speed Internet Refrigeration Server Management Computing Infrastructure Disaster SaaS Techology Gaming Console Touchscreen Deep Learning OneNote Cyberattacks Legislation Google Wallet Dark Web Writing Development Cooperation Digital Signature Chromebook Disaster Resistance Employee-Employer Relationship Motherboard Read Only G Suite Memory Drones Data Warehousing Social Engineering Buisness Laptop Hard Drive Cables Patch Management Staff IT Consulting Identities Backups Modem Bookmarks Documents Travel Software as a Service Microsoft Excel Adminstration CIO Halloween Cache Entrepreneur Wires Undo Operations Politics Data Breach 3D Solid State Drive PC Care Legal 5G Cookies Favorites PDF Meetings Technology Tips Value People eBay Scary Stories Management Virtual Private Network Telephony Technology Laws Remote Support Alt Codes Leadership New Additions Monitoring Nanotechnology Instant Messaging Skype Comparison Streaming Media

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code