XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!

Where You May be Seeing More AI Soon
Technology Addiction is a Very Real, Very Scary Th...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network IT Support Innovation Business IT Services Social Media Business Management Business Continuity Smartphones Server Miscellaneous Upgrade Communication Virtualization Disaster Recovery User Tips Windows Data Backup Communications Computer Microsoft Office Managed IT Services Users Smartphone Passwords Data Recovery Mobile Device Management Browser Android Holiday WiFi Save Money Marketing Alert Ransomware Tech Term Outsourced IT Internet of Things BDR Mobile Computing Cybercrime Vendor Management Router Windows 10 Operating System Remote Monitoring Chrome Cloud Computing BYOD Information Technology Artificial Intelligence Avoiding Downtime Computers Automation Bring Your Own Device Apple Current Events Going Green Big Data Best Practice Remote Computing History IT Solutions The Internet of Things VPN Firewall Managed IT Services Telephone Systems Cybersecurity Spam IT Consultant Health Employer-Employee Relationship Trending Application Printer Collaboration Facebook Hacking Phone System Wireless Technology Social Engineering Productivity Office Windows 10 Mobility Excel Budget App Bandwidth Lithium-ion Battery Money Proactive IT Office 365 Fax Server Applications Mobile Device Business Intelligence Maintenance Windows 8 Phishing Two-factor Authentication Unified Threat Management IT Support Recovery iPhone Mouse Business Managament Content Filtering Networking How To Access Control Gmail Antivirus Encryption Apps Settings Information Analytics PowerPoint Google Drive Data Protection Blockchain Managed IT Word User Error Customer Relationship Management Training Value Humor Hard Drives Sports Data Security Outlook Tutorials Private Cloud Website Virus Redundancy Law Enforcement IT Management Flexibility Administration Servers Entertainment Digital Payment Saving Time Social Networking Retail Computer Repair Machine Learning Tech Support Human Resources Software as a Service Downtime Analysis File Sharing Memory Scam Managed Service Network Congestion Hacker Administrator Conferencing Vulnerability Connectivity Search Save Time Tablet Wi-Fi Inbound Marketing Identity Theft Twitter Social Document Management Office Tips Data Management Streaming Media Risk Management Voice over Internet Protocol Compliance Solid State Drive Data loss Programming Smart Tech Skype Help Desk Black Market Fraud Spam Blocking Instant Messaging CES IT Plan Wireless Physical Security Augmented Reality Intranet Environment Cleaning Password Running Cable Video Surveillance Wearable Technology Public Cloud SaaS Biometrics Content Management IT service Piracy Unsupported Software IBM Infrastructure Data storage Display Leadership Best Available Paperless Office OneNote Update Bluetooth Computer Accessories eWaste Internet Exlporer People Data Storage Comparison Keyboard Telephony PDF Samsung Virtual Assistant Work/Life Balance Data Breach USB Windows 7 HaaS End of Support Robot Google Docs Safety Government Online Currency Botnet YouTube Meetings Recycling Workers Point of Sale Education Telephone System Touchscreen Credit Cards DDoS Statistics Webinar Millennials Customers Remote Support Line of Business Upgrades Analyitcs Mobile Cortana Uninterrupted Power Supply nternet Crowdfunding Electronic Health Records eCommerce Knowledge Wireless Charging Advertising Wire Microchip FENG Customer Service Multi-Factor Security Strategy Consultant Frequently Asked Questions Distributed Denial of Service Files Company Culture Content Filter Camera Patch Management Chromecast Law Firm IT Cryptocurrency Workforce Authentication MSP 360 Emails Professional Services Google Apps Vendor Screen Mirroring Insurance Flash Fiber-Optic Notifications LinkedIn Smart Office Electronic Medical Records Cameras Lifestyle Safe Mode Business Owner Licensing Tip of the week Amazon Colocation Net Neutrality Storage Windows 10s Webcam Laptop Telecommuting SharePoint Windows 8.1 Update Nanotechnology Remote Worker Virtual Reality Tools Shadow IT HVAC Security Cameras Charger Cast WIndows 7 Macro Practices HIPAA Sync Cables Hybrid Cloud Search Engine Hiring/Firing Printer Server Shortcut Accountants Business Technology User PC Care Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Virtual Private Network Worker Commute Touchpad Debate Co-managed IT Managing Stress 3D Domains Software Tips Remote Work Relocation Wiring Hosted Solution Scheduling Bloatware Password Manager Legal Enterprise Content Management Computer Care Monitor Hosted Computing Proactive Science Unified Communications Students Bing eBay Alerts Online Shopping Cache Project Management Audit Staff Devices GDPR Netflix Entrepreneur Business Mangement Password Management Data Warehousing Specifications Reputation Inventory Remote Monitoring and Maintenance Tablets Start Menu Theft Healthcare Shortcuts Root Cause Analysis Text Messaging IT Security IoT Supercomputer Hiring/Firing Work Station Regulations Evernote Internet exploMicrosoft Wireless Internet Warranty Computer Fan Windows Media Player Gaming Console Virtual Desktop Digital Signature HBO Thought Leadership E-Commerce Cost Management Travel Criminal NarrowBand Print Server NIST Music Worker Regulation Audiobook Assessment Thank You Scalability Rootkit Politics Utility Computing Television Congratulations Printers Transportation How to Troubleshooting Webinar Techology Automobile Public Computer Benefits IT solutions Employee/Employer Relationship Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Smartwatch Content Two Factor Authentication Battery Emergency Video Games

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *