Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Downloads Printing Network Congestion Touchscreen Gmail Cookies Internet Exlporer Windows 10 5G Competition Microsoft Distributed Denial of Service Mobile Data Legal Test Digital Payment Monitors Geography Collaboration Outsourced IT Virtual Private Network Save Money Firefox Enterprise Content Management Break Fix Computer Care Machine Learning Patch Management Technology Tips Customer Relationship Management Mobile Office Halloween YouTube CCTV Google Maps Antivirus Connectivity IoT Innovation Regulations History Public Cloud Conferencing Settings Unsupported Software Buisness Proactive Telephony Fraud Public Speaking Authorization Legislation Vendor Management Cables Scary Stories Smart Technology Mirgation Hardware Data Mobile Security Notes Tablet Typing Storage Remote Monitoring and Management High-Speed Internet Technology Laws Managed Service Provider Office 365 Retail Money Data Warehousing Techology Hosted Solution Emoji CIO Hard Drives Remote Monitoring Networking Outlook Samsung Remote Worker Black Friday Passwords Cost Management Staffing Smart Tech Unified Threat Management IT service Security Cameras Development Project Management Augmented Reality Internet Server Data loss Administrator Office Tips Cryptocurrency Twitter Employee-Employer Relationship RMM Network Knowledge Backups Hacks Artificial Intelligence Network Management PowerPoint Data Backup Word Bring Your Own Device Government Experience Google Drive Zero-Day Threat Bookmarks Virtual Reality Infrastructure Data Management Virtual Assistant Update Spam User Alt Codes Fleet Tracking Software as a Service Business Management BYOD Display Miscellaneous Asset Tracking Staff Wasting Time Authentication Financial Privacy Google Wallet Alerts Language Gadgets Best Practices Android SharePoint Assessment Deep Learning Lithium-ion Battery Web Server Employees Humor E-Commerce Voice over Internet Protocol Save Time WannaCry Instant Messaging Recycling Windows 7 Procurement VPN Small Business Managed IT Services Cleaning Fun Black Market Cloud Computing Star Wars Unified Threat Management SaaS Business Continuity Communication IT Consulting Remote Workers Mail Merge Vulnerability Identity Theft Error Compliance Dark Web Documents Network Security Employer-Employee Relationship Presentation Wearable Technology Comparison Alert Computers Permissions Cyber Monday Applications Electronic Health Records Consulting Refrigeration Business Technology User Error Undo Cybersecurity Webcam Safety Nanotechnology Phone System Cabling Bitcoin Time Management Physical Security Workplace Tips Help Desk Social Media Mobile Device Redundancy Going Green GPS Mouse Virtualization Managed IT IT Budget Enterprise Resource Planning Finance Politics USB Backup Servers IT Management Managing Stress Analytics Disaster Resistance Motion Sickness Analyitcs Google Calendar Mobile Devices Chatbots Scam How To IT Services Law Enforcement Data Security Social Server Management Migration Wi-Fi Remote Computing WiFi Virtual Desktop Managed IT services Access Control Address Cyberattacks Application 3D Printing Marketing Operations Relocation Vulnerabilities IT Consultant Administration Security Software WPA3 Dark Data Microsoft Excel Bluetooth Maintenance Password Business Owner Two-factor Authentication Management Smartphones App Windows 8 Data Breach IBM Business Intelligence Business Growth Hacker LiFi Tech Term Mobile Device Management Saving Money Education The Internet of Things Blockchain Professional Services Search Tech Terms Best Practice Spyware Facebook iPhone Co-managed IT Permission Hosted Solutions Wires Big Data Files MSP Hotspot Uninterrupted Power Supply Ransomware Avoiding Downtime Trending Health Paperless Office Operating System BDR Customer Service Programming Upgrades G Suite Disaster Tracking Private Cloud Chrome ROI Content Filtering Printer Computer Repair Downtime Firewall HIPAA Managed Services Provider Social Engineering Cameras IT Support User Tips Hiring/Firing Intranet Mobile Device Managment Malware Theft communications Crowdsourcing VoIP Processors Virus Cortana Current Events Consultation Shortcut Encryption Risk Management Technology Document Management Tech Support PDF Travel Chromebook Wireless Utility Computing Net Neutrality Microsoft Office Windows Solid State Drive Company Culture Users Licensing Google Docs Digital Signature IT solutions Electronic Medical Records Consumers Managed Service Modem Unified Communications Hacking How To Troubleshooting Wireless Technology Backup and Disaster Recovery Hard Disk Drive Digital Sync Productivity Superfish Point of Sale Mobility Information Technology Windows 10 Identity Apps Lenovo Router Motherboard Data Recovery Managed IT Service Websites Domains Office Sports Proactive IT Favorites Monitoring Computing Infrastructure Holiday Flexibility Google Piracy Computer Computing Screen Reader Human Error Quick Tips Healthcare Cybercrime Browser Tip of the week Work/Life Balance Phishing Hard Drive Personal Information Heating/Cooling Drones Botnet Tip of the Week Cloud Corporate Profile Writing Internet of Things Telephone Systems Statistics Business Computing Environment Budget Mobile Automation Taxes Identities Efficiency Information Hackers Specifications Data storage Bandwidth Business Productivity Saving Time Disaster Recovery VoIP End of Support Meetings Smartphone Cache Notifications Database Cooperation Supercomputer Running Cable Gadget Upgrade Entrepreneur Apple IT Support Laptop Multi-Factor Security Mobile Computing Recovery Robot IT Technicians OneNote Email IP Address eWaste Website Training Features File Sharing Automobile Read Only Software Tips Social Networking

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...