Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Staffing Piracy WiFi Scam Identities Hiring/Firing Zero-Day Threat Mobile Devices Specifications Tracking Dark Web Physical Security PDF Backup and Disaster Recovery Google Drive communications Business Continuity History Cyberattacks Security Cameras Risk Management Patch Management Business Computing Communication Settings Hackers Update Travel SharePoint Web Server Paperless Office Servers Firefox 3D Printing Webcam OneNote Enterprise Content Management Cameras Downtime Digital Microsoft Motion Sickness RMM Disaster Resistance CCTV HIPAA Productivity Virtual Private Network Tablet Business Technology Buisness Notifications Analyitcs Going Green Humor Big Data Project Management Healthcare Internet of Things Black Friday Server Bookmarks Proactive Data Breach Permissions Users Google Maps Social Engineering Features Test Time Management Computers Tip of the week Cortana Managed IT services Cleaning Managed IT IT solutions Dark Data Best Practice Tech Support Computing Save Money Gadgets WPA3 Assessment Gmail Digital Signature Holiday Software Tips Sync Google Calendar Data loss Running Cable The Internet of Things Hosted Solution Corporate Profile Utility Computing Save Time Vulnerability Network Management Monitoring Mobile Cookies Modem Intranet Administration Error Wearable Technology Malware Identity Theft Typing Smartphone Upgrade Automation Marketing Data storage Legal Business Intelligence Google Docs BDR Managed IT Services Websites Solid State Drive Tech Term Staff Windows Applications Connectivity Antivirus Vulnerabilities Law Enforcement 5G Black Market Remote Monitoring Software Bitcoin Network Security Programming IT service Password Office 365 Apps Proactive IT Hard Drive Asset Tracking Unsupported Software Drones Star Wars Company Culture IT Support Remote Computing Samsung Employees VoIP Lenovo Touchscreen Politics Experience Office Tips Encryption Cost Management Operations Machine Learning Personal Information Android Managed Service Provider Data Backup Windows 8 Superfish Fleet Tracking Mobile Security Compliance Router Technology Laws LiFi Mobile Device Management Recycling Augmented Reality Information Technology Social Networking Phishing Finance Theft Maintenance IT Services Computer Saving Money User Error End of Support Writing Geography Technology Tips Network Congestion Hard Drives Motherboard Virtual Reality Automobile Technology Cabling Wires Read Only Refrigeration BYOD Training High-Speed Internet Business Growth Mirgation Blockchain Mobile Device IT Technicians Private Cloud Operating System Search Hacking Relocation Heating/Cooling Address Display Point of Sale Development Public Cloud Wireless Technology Recovery Word Computer Care Enterprise Resource Planning Telephony Remote Workers Unified Threat Management Language Domains Mobile Office Comparison Work/Life Balance Browser Information VoIP Printer PowerPoint Competition Employee-Employer Relationship Data Recovery Authorization Cables Document Management Hardware Chrome File Sharing Troubleshooting Hacker Microsoft Office App Office Scary Stories Retail User Tips Data Internet Mouse Wi-Fi Uninterrupted Power Supply Entrepreneur Miscellaneous Bandwidth Money YouTube Monitors MSP Taxes Remote Monitoring and Management Electronic Medical Records Techology G Suite Human Error How To Virus Help Desk Access Control E-Commerce Cybersecurity Unified Threat Management Flexibility Identity Google Wallet CIO IT Management Government Botnet Managed Services Provider Instant Messaging Productivity Windows 10 Small Business Gadget Disaster Vendor Management Electronic Health Records Data Warehousing Software as a Service Collaboration IT Consulting Email Authentication Cryptocurrency Analytics How To Social Artificial Intelligence Cybercrime Supercomputer Trending Employer-Employee Relationship Two-factor Authentication Halloween Co-managed IT Backups Data Management Spam Redundancy Hard Disk Drive Security Phone System Safety Tech Terms Screen Reader Distributed Denial of Service Alerts Knowledge Managing Stress Facebook Cloud Computing Business Chromebook Management Regulations Social Media Alt Codes Chatbots Laptop Alert Permission Telephone Systems Net Neutrality Internet Exlporer Outsourced IT IT Consultant Best Practices Public Speaking Bring Your Own Device ROI Outlook Downloads Application Saving Time Multi-Factor Security SaaS eWaste Managed IT Service User Hacks Mobility Break Fix Presentation IoT Cache Smart Technology Lithium-ion Battery Computing Infrastructure Digital Payment Customer Relationship Management Spyware Business Owner Wireless Processors Upgrades Bluetooth Passwords WannaCry Legislation Business Management Data Security Apple Smartphones Fraud Website Virtualization Twitter IP Address Mobile Computing Fun Storage Deep Learning Server Management Mobile Data Workplace Tips Health Network Customer Service Migration Windows 10 Remote Worker Conferencing Crowdsourcing Licensing Consultation Administrator Innovation Backup Statistics Quick Tips Privacy Unified Communications Efficiency Shortcut USB Sports Cyber Monday Documents Networking Robot Computer Repair Smart Tech Emoji Disaster Recovery Consulting iPhone Printing Cloud Education Favorites Hotspot IBM Microsoft Excel Firewall Avoiding Downtime Current Events Tip of the Week Undo Hosted Solutions Content Filtering Budget Ransomware GPS Virtual Desktop Nanotechnology Procurement VPN IT Budget Infrastructure Mail Merge Files Managed Service Environment Google Mobile Device Managment Consumers Meetings IT Support Financial Cooperation

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...