10 Gmail Hidden Features That Can Transform Your Email Experience

In email services, Gmail stands tall as one of the most popular and feature-rich platforms. While many users are familiar with the basics of sending and receiving emails, Gmail offers many lesser-known features that can significantly enhance your email management and productivity. In this blog post, we will delve into 10 Gmail Hidden Features that you might not be aware of.

1. Schedule Emails for the Perfect Timing

Have you ever wanted to compose an email but send it at a later, more convenient time? Gmail allows you to schedule emails effortlessly. When composing a message, click on the small arrow next to the “Send” button and choose the date and time you want your email to be dispatched. This is among the very useful Gmail hidden features that can make your work easy.

Gmail Hidden Features Schedule Emails

2. Undo Send – A Second Chance for Mistakes

Have you ever hit the send button only to realize you made a mistake? Gmail’s “Undo Send” feature gives you a brief window to retract your sent email. Head to your Gmail settings, enable this feature and set the cancellation period (usually 5-30 seconds) to grant yourself a second chance after sending an email.

3. Multiple Inboxes for Better Organization

Take control of your inbox by enabling Gmail’s Multiple Inboxes feature. This allows you to divide your inbox into multiple panes, each displaying emails based on specific categories or labels.

How to Create Multiple Inboxes

  • On your computer, go to Gmail.
  • At the top right, click Settings.
  • Next to “Inbox type,” select Multiple inboxes.
  • To change multiple inbox settings, click Customize.
  • Enter the search criteria you want to add for each section.
  • To search for starred emails, use: is:starred.
  • When you search a person’s email address, the results in that section will also show emails from their alias. To limit the search to only the original email, the search should be enclosed in double-quotes. Example: “from:john.doe@gmail.com”.
  • When you search “from:email”, the results will also return Drive sharing notification emails from when that person shared a file with you.
  • Under “Section name,” enter a name for the section.
  • Next to “Maximum page size,” enter the number of emails you want to view in the section.
  • Next to “Multiple Inbox position,” choose where you want to place the sections.
  • At the bottom, click Save Changes.

4. Smart Compose – Your Intelligent Email Assistant

Gmail’s Smart Compose feature suggests auto-completions as you type, making email composition faster and more efficient. Enable Smart Compose in the “General” tab of your Gmail settings and let Gmail help you compose emails with ease.

5. Create Email Aliases for Easy Filtering

To keep your inbox organized, create email aliases by adding a “+alias” to your email address. For instance, use your.email+newsletter@gmail.com when signing up for newsletters. You can then set up filters to sort emails based on these aliases.

One useful trick involving temporary aliases is to create filters that put emails sent to one email address, such as, “johndoe+@gmail.com,” in a folder other than your inbox. This way, you can prevent your inbox from buckling under the weight of too many promotional emails.

How to Create Gmail Email Aliases for Easy Filtering

You can make use of either of the two options

  1. Plus Symbol (+)
  2. Dots (.)

Plus Symbol (+):

Gmail ignores everything after the plus sign-in your email address. For example, if your email is example@gmail.com, emails sent to example+alias@gmail.com will still be delivered to your primary inbox.

Example:

  • Primary Email: example@gmail.com
  • Alias: example+shopping@gmail.com
  • Alias: example+work@gmail.com

Dots (.) Option

Gmail doesn’t recognize dots in email addresses. Therefore, example@gmail.com is the same as e.x.a.m.p.l.e@gmail.com.

Example:

  • Primary Email: example@gmail.com
  • Alias: e.x.a.m.p.l.e@gmail.com
  • Alias: ex.ample@gmail.com

With these techniques, you can easily filter emails using Gmail’s filters and labels. For instance, you can create filters that automatically label and archive emails based on the alias used. Here’s how you can set up filters:

How to Create a Filter:

  • Click on the gear icon in the upper-right corner of Gmail and select “See all settings.”
  • Go to the “Filters and Blocked Addresses” tab.
  • Click on “Create a new filter.”
  • Specify Filter Criteria:
  • In the “To” field, enter your alias (e.g., example+shopping@gmail.com).
  • Click on “Create filter.”
  • Apply Actions:
  • Choose actions like “Skip the Inbox,” “Apply the label,” or “Mark as read.”
  • Create a new label for the alias (e.g., “Shopping” or “Work”).
  • Create Filter:
  • Click on “Create filter.”

Repeat this process for each alias you want to filter. This way, emails sent to specific aliases will be automatically sorted into their respective labels, making it easier for you to manage your inbox.

6. Right-Click for Quick Actions

Save time by right-clicking on emails in your inbox to reveal a quick menu with actions such as archiving, marking as unread, or deleting. This shortcut can streamline your email management process compared to using the toolbar.

7. Master the Art of Search with Advanced Operators

Gmail supports powerful search operators to refine your search queries. For instance, use “filename:” to search for attachments or “in:inbox” to narrow down your search to the inbox only. Mastering these operators can help you find what you need more efficiently.

8. Offline Mode – Access Your Emails Anywhere

Gmail’s Offline Mode allows you to access your emails without an internet connection. Enable this feature in settings, and Gmail will synchronize your emails for offline access. Ideal for travellers or those with intermittent internet connectivity.

9. Customize Swipe Actions on Mobile

For mobile users, Gmail offers the ability to customize swipe actions. Whether you want to archive, delete, or mark as read with a simple swipe gesture, you can tailor these actions to suit your preferences.

10. Efficiency Boost with Keyboard Shortcuts

Navigate Gmail like a pro by using computer keyboard shortcuts. Enable this feature in the “General” tab of your settings and familiarize yourself with shortcuts for tasks like composing, archiving, and navigating between emails. It’s a surefire way to boost your efficiency.

In conclusion, Gmail goes beyond being a simple email platform, offering a range of features designed to make your email experience seamless and efficient. By exploring and utilizing these lesser-known Gmail hidden features, you can transform the way you manage your emails, saving time and increasing productivity. Unlock the full potential of Gmail and elevate your email game today.

How To Book For Canada Biometrics In Kenya

This is a guide on how to book for Canada biometrics in Kenya. The process involves some specific steps to be followed. Canada requires certain visa applicants to provide biometrics (fingerprints and photographs).

Before you book for Canada Biometrics in Kenya however, make sure you have filed the visa application forms and paid any necessary visa fees. I have provided a complete guide on how to apply for a Canadian Visa and make payment.

Steps to Follow to Book for Canada Biometrics in Kenya

Here are the steps to book a biometrics appointment for a Canadian visa application from Kenya. But first, retrieve your Biometric Instruction Letter from the IRCC website. You will use it to book for Canada Biometrics in Kenya

Log in to the Immigration, Refugees, and Citizenship Canada (IRCC) website to access your Biometric Instruction Letter. This is in case you have applied for a Canadian visa and have been requested to provide biometrics. Here are the general steps:

  1. Visit the IRCC Website: Go to the official IRCC website at https://www.canada.ca/en/immigration-refugees-citizenship.html.
  2. Log in to Your Account, the one you used for the main visa application.
  3. Access Your Application: Once you’ve logged in, you should be able to access your visa application. Click on the section indicating that you have a new message.
  4. The full application status will open. Read through the various stages and you will encounter an area saying that your biometrics are required.
  5. Below that section is your Biometrics Instruction Letter. Download and print the letter as you will need it during the appointment date. The letter contains important details such as your IRCC Number, the deadline for completing your biometrics and the location of the Visa Application Centre (VAC) where you need to go.

Access VFS Global to Book for Canada Biometrics in Kenya

VFS Global is one of the service providers used by Canada to facilitate the biometrics collection process for visa applicants. Here are the general steps to follow to access VFS Global and book a biometrics appointment for Canada from Kenya.

  1. Visit the VFS Global Website: Click on visas, eVisas and Permits tab. Select the country you are applying from and the one you are visiting. Click on take me to the website.
  2. Select the option of booking an appointment.
  3. Select your preferred method of booking your appointment and click View More.

There are Five Main Methods you can use to book Your Canada Biometrics

  1. Online – The link will redirect you to an Appointment Login screen which enables you to: 
  • Schedule an appointment
  • Re-schedule an appointment
  • Cancel an appointment

You’ll have to follow the instructions mentioned on the page to create your own login credentials and schedule an appointment.

2. Telephone – If you wish to schedule an appointment via phone, you can do so by calling the helpline number 0800720214. A contact centre agent will be available to assist you in scheduling, rescheduling, or cancelling an appointment.

3. Email – If you wish to schedule an appointment via email, you can do so by using the web form.

4. Web Chat – If you wish to schedule an appointment, you can do so by clicking the Chat Now link. A contact centre agent will be available to assist you in scheduling, rescheduling or cancelling an appointment.

6. In Person – You can walk into the Canada Visa Application Centre during stipulated business hours to request this service and also schedule an appointment using the self-service method.

How to Book for Canada Biometrics in Kenya Using Online Option

  1. Click on the View More option to access the online booking option.
  2. Click on Create Account. Remember to activate your account using a link that will be sent to your email.
  3. Log into the VFS site and select the visa centre you wish to attend.
  4. Add the applicant(s) before proceeding to book your desired date of Biometrics for your Canadian Visa.

What you need to bring with you during the appointment:

When you present yourself at the biometric collection service point of your choice, you must bring the following:

  • a copy of the Biometric Instruction Letter, and
  • the passport or travel document that you referenced in your application.

A Note About Emergency Biometric Appointments:

The criteria for an emergency biometric appointment are as follows:

  • Death of an immediate family member residing in Canada
  • Critically ill immediate family member residing in Canada

An immediate family member is defined as a

  • spouse or common-law partner
  • dependent child
  • dependent child of a dependent child
  • parent or step-parent
  • guardian or tutor

Applicants requesting emergency appointments for the purpose of biometric collection must provide proof of emergency (any one of the following) at the time of attending an appointment at the VAC

  • Death/Medical Certificate
  • Letter from Medical Officer/Unit
  • Letter from Funeral Home

Please note the VAC will report all applicants to IRCC who do not present the required proof of emergency at the time of attending an emergency appointment at the VAC. IRCC may take this into consideration when reviewing the application.

An emergency biometric appointment does not affect IRCC’s processing times for the application or the outcome.

Please note that emergency biometric appointments cannot be scheduled using the online appointment system. To schedule an emergency biometric appointment, please do so by calling the VAC Contact Centre or by visiting the VAC in person.

What is a Printed Circuit Board (PCB)? A Comprehensive Guide

A printed circuit board (PCB) is a critical component in many electronic devices. It serves as a platform for connecting and supporting electronic components like integrated circuits (ICs), resistors, capacitors, and connectors.

PCBs provide a physical structure and electrical connections for these components. This allows them to work together to perform various functions in electronic devices. A good example is a computer motherboard.

Here are Some Key Points About Printed Circuit Boards:

1. Basic Structure of the Printed Circuit Board

PCBs are typically made of a non-conductive substrate material (usually fibreglass-reinforced epoxy) with a thin layer of copper foil bonded to one or both sides. The copper foil is used to create the conductive pathways, also known as traces or tracks, that carry electrical signals between components.

2. Components: 

Electronic components are soldered onto the PCB. These components can include microchips, transistors, diodes, capacitors, resistors, connectors, and more.

3. Layers

PCBs can have multiple layers of copper traces, with each layer separated by insulating material. Multi-layer PCBs are used in complex electronic devices to accommodate more components and intricate circuitry.

4. Solder Mask

A solder mask is a protective layer applied to the PCB to cover and insulate the copper traces, preventing accidental short circuits and oxidation. It is typically green, but it can come in various colours.

5. Silkscreen

PCBs often have a silkscreen layer, which is a layer of ink containing labels, symbols, and other markings that help with component placement and identification.

6. Through-Hole vs. Surface Mount

PCBs can support through-hole components (components with wire leads that pass through holes in the board) or surface-mount components (components soldered directly to the board’s surface).

7. Manufacturing of Printed Circuit Board

PCBs are manufactured through a process that involves designing the PCB layout using specialized software, fabricating the board itself (which includes etching the copper traces and adding layers), and populating it with electronic components using automated or manual assembly methods.

8. Applications

PCBs are used in a wide range of electronic devices, from simple items like calculators and remote controls to complex systems like smartphones, computers, medical equipment, and aerospace systems.

9. Customization

PCBs can be customized for specific applications. Designers can create unique circuit layouts and choose materials that meet the requirements of the device.

10. Testing

PCBs undergo rigorous testing to ensure they function correctly. This includes electrical testing, functional testing, and quality control checks.

PCBs are a fundamental technology in modern electronics, enabling the miniaturization and functionality of electronic devices we use in our daily lives. They have evolved significantly over the years, becoming more complex and capable as electronic devices have become more sophisticated.

How the Printed Circuit Board is Made

The manufacturing of printed circuit boards (PCBs) involves several steps, from designing the circuit layout to producing the final board. Here’s an overview of the PCB manufacturing process:

Each of these steps is critical in ensuring the successful production of a functional PCB that meets the specifications of the intended electronic device. PCB manufacturing can be highly automated for large-scale production or customized for unique and specialized applications.

Mastering Computer Hardware: A Comprehensive Guide to Understanding the Digital Building Blocks (2023)

Subscribe to continue reading

Subscribe to get access to the rest of this post and other subscriber-only content.

Enhancing Online Security: A Comprehensive Guide to Protecting Your Digital Accounts

Online Security

In our rapidly evolving digital landscape, safeguarding your online accounts has become paramount. The rise of cyber threats underscores the importance of robust online security practices. This comprehensive guide is designed to lead you through the essential steps of bolstering your digital defences and ensuring the safety of your sensitive information.

15 Best Practices to Achieve Online Security

Establish Strong and Unique Passwords

The foundation of online security lies in crafting strong and distinctive passwords for each of your digital accounts. These passwords should be intricate and defy predictability, comprising a blend of uppercase and lowercase letters, numerals, and special characters.

Harnessing the Power of Password Managers

Discover the convenience of password managers, which can generate, store, and automatically enter your passwords. These tools encrypt your passwords, simplifying the management of complex passwords across various accounts. This is what you achieve with password managers.

Multi-Factor Authentication (MFA) for Added Security

Multi-Factor Authentication (MFA) is also known as Two-Factor Authentication (2FA) Elevate your security measures by activating multi-factor authentication whenever feasible. MFA necessitates supplementary verification, such as a code sent to your phone, in conjunction with your password.

There are three main types of factors used in multi-factor authentication:

Shielding Yourself from Phishing Attacks

Vigilance against unsolicited emails, messages, and links soliciting your login credentials is essential. Phishing attacks mimic authentic websites to deceive users into divulging their passwords.

Here are steps you can take to shield yourself from phishing attacks:

Periodic Password Updates

Rotate your passwords at regular intervals, particularly for vital accounts. This approach curtails unauthorized access, even in the aftermath of a breach. Users can change their passwords at regular intervals, such as every 30, 60, or 90 days.

Eschew Personal Information in Passwords

Abstain from incorporating easily discoverable details like birthdays, names, or everyday expressions in your passwords. Cybercriminals can readily obtain such information from social media or other public sources.

Fortify Recovery Options

Secure your password recovery options meticulously. Utilize robust security questions or alternate options such as secondary email addresses, rather than information that can be easily unearthed.

Consistent Account Activity Oversight

Regularly inspect your account activity for any signs of unusual or unauthorized access. Numerous online services provide tools for tracking login attempts and activity histories.

Stay Informed and Educated

Yes, like you are doing now. Remain up-to-date with the latest cybersecurity risks and best practices. The landscape is ever-evolving, and knowledge is an indispensable shield.

Routine Software Updates to enhance Online Security

Maintain the currency of your devices and software. Updates frequently encompass security patches designed to rectify known vulnerabilities.

Device Security

Bolster your devices with robust passwords, PINs, or biometric safeguards. Ensure devices are locked when not in use to forestall unauthorized access.

Secure Wi-Fi Networks

Use strong passwords for your Wi-Fi networks and enable WPA3 encryption. Avoid using public Wi-Fi networks for sensitive tasks.

Use a Firewall to bolster Online Security

Enable the built-in firewall on your computer or use reputable third-party firewall software to protect against unauthorized network access.

Regular Backups

Back up your important data regularly to an external drive or a cloud service. In case of a cyberattack, you won’t lose valuable information.

Install Antivirus Software

Use reputable antivirus software to detect and remove malware, spyware, and other malicious software from your devices.

Conclusion on Online Security Measures and Best Practices

Elevating your online security requires an ongoing commitment to vigilance and attention to detail. By incorporating these meticulous best practices for password management, you significantly elevate your digital safety, minimizing the likelihood of succumbing to cyber threats.

Although no security method is entirely infallible, the amalgamation of robust passwords, multi-factor authentication, and informed decision-making contributes immeasurably to protecting your digital presence and sensitive data.

Adopt a proactive stance, remain attuned to the latest developments, and prioritize online security to cultivate a more secure and guarded digital journey.

Exit mobile version