Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Google Drive Tips You May Not Have Heard Of

Tip of the Week: 3 Google Drive Tips You May Not Have Heard Of

If you use Google Drive as your preferred cloud provider, you know that it’s a dynamic service that offers everything from word processing to spreadsheets to file storage. However, there are many other ways to use Google Drive that you may not even be aware of. Here are three secret tips that can help you get a little more value out of Google Drive.

Continue reading

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Virus Small Business Regulations Experience Chrome Printer Cooperation Google Maps Facebook SaaS Windows Information Healthcare Microsoft Excel Network Browser Outsourced IT Help Desk Drones Digital Payment Managed IT services Google Drive Lithium-ion Battery IT Consulting Spam Features Remote Monitoring and Management User Tips Staff Hackers Phishing Remote Monitoring Virtual Private Network Vulnerability Cables Health Cybersecurity Google Calendar Assessment Comparison IT Support Internet of Things Domains Cloud Robot Mobile Computing Software Business Continuity Utility Computing Mail Merge Black Friday VPN Proactive IT PowerPoint Chatbots Document Management Financial Managed Services Provider Business Management IT solutions Two-factor Authentication Network Security How To Twitter Favorites LiFi Disaster Recovery Modem Users Humor Technology Tips Application Save Money Hacks Enterprise Resource Planning IT Management Theft Consultation Tech Terms HIPAA Tracking Data storage Managed IT Phone System Remote Worker Conferencing Operating System Retail Passwords Documents Time Management Identities The Internet of Things Search Display IT Technicians Upgrade Permissions Cookies Best Practice Save Time Geography Fun Taxes Laptop Webcam Web Server Monitors Ransomware Bookmarks Data Backup Collaboration Multi-Factor Security Email WPA3 Co-managed IT Managing Stress Money Computer Care Smart Tech Connectivity Programming Entrepreneur Smartphones Shortcut Read Only Firewall Backups Microsoft Remote Workers Project Management Router Competition Business Patch Management Nanotechnology Undo WiFi IBM Website Telephone Systems Personal Information File Sharing Managed IT Service Computer Microsoft Office Cameras Monitoring Refrigeration Techology Network Management eWaste Gmail Administrator Scam Solid State Drive Cabling Communication Websites Mobile Device Managment Mobile Devices Wi-Fi Halloween Zero-Day Threat Files Mobile Data Compliance Saving Money Employer-Employee Relationship Company Culture Legislation Analyitcs Hotspot Alert Office Tips Budget Error Tablet IP Address GPS Business Growth Business Owner Avoiding Downtime Cost Management IT service BDR Telephony Machine Learning Server Management History Virtualization Deep Learning Star Wars Hacking Fraud App Storage Statistics Address Trending Environment Cyber Monday Finance Screen Reader Recovery Data Warehousing Vulnerabilities Government Electronic Medical Records Travel Chromebook Administration Data Recovery Electronic Health Records IT Budget Mobile Security User Error Settings Customer Relationship Management Hard Disk Drive Emoji Consumers Blockchain Scary Stories Presentation Running Cable Antivirus Security Safety Alt Codes Network Congestion Outlook Managed Service Cryptocurrency Public Speaking Heating/Cooling Servers Touchscreen Cybercrime Miscellaneous Data Security Meetings Maintenance Language Consulting Mobile Device Content Filtering Backup Piracy IT Consultant Disaster Productivity Cortana Proactive Troubleshooting Authentication Education User Mirgation Unified Communications Digital Signature Data Breach Update Disaster Resistance SharePoint Efficiency MSP Employees Password USB Computing Supercomputer Tech Support Security Cameras Best Practices Digital Workplace Tips Work/Life Balance Office BYOD Augmented Reality Instant Messaging Dark Web WannaCry Applications Procurement Specifications Unsupported Software Malware Business Computing Remote Computing Recycling Notifications Downloads Upgrades Managed IT Services Automobile Test 3D Printing IT Services Superfish Automation Break Fix Privacy Data Management Hosted Solution Mobile Device Management G Suite Enterprise Content Management Windows 10 Alerts Business Technology Black Market Paperless Office Infrastructure CCTV Google Wallet Smart Technology Downtime Innovation Distributed Denial of Service IT Support Android Public Cloud Politics How To Google Permission Tip of the Week Redundancy Uninterrupted Power Supply Wireless Technology Gadgets Wearable Technology Current Events communications Printing Cleaning CIO Development Authorization Operations Dark Data Staffing Customer Service Flexibility Social Media Lenovo Saving Time Tip of the week Software Tips Hosted Solutions Physical Security Marketing Writing iPhone Software as a Service Social Employee-Employer Relationship Samsung Sports 5G Computing Infrastructure Fleet Tracking Hard Drives Internet Net Neutrality Vendor Management Managed Service Provider Mobile Office VoIP Cache Crowdsourcing Word Migration Spyware VoIP Legal Google Docs Motherboard ROI Bandwidth RMM Hard Drive Analytics Private Cloud Motion Sickness Unified Threat Management Relocation Encryption Sync Asset Tracking Apple Licensing Apps Risk Management Typing IoT Productivity Identity Windows 8 Gadget Hardware Cloud Computing Data loss Smartphone Mouse Unified Threat Management Human Error Point of Sale YouTube Windows 10 E-Commerce Processors Mobile Access Control Technology Laws Botnet End of Support Intranet Networking Corporate Profile Bitcoin Server Hiring/Firing Virtual Desktop Artificial Intelligence Computer Repair Going Green Computers Holiday Bring Your Own Device Hacker Firefox Identity Theft Big Data Wireless Data Backup and Disaster Recovery OneNote Mobility Law Enforcement Social Networking Internet Exlporer Office 365 Quick Tips Business Intelligence High-Speed Internet Management Wires Virtual Reality Bluetooth Training Knowledge PDF Social Engineering Information Technology Buisness Cyberattacks Tech Term Technology

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...