Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Get the Most Out of Google Maps With These 4 Tips

Tip of the Week: Get the Most Out of Google Maps With These 4 Tips

Throughout human history, cartography served as an exciting and specialized field for knowledgeable scribes. Today, the entire planet has been mapped and apps like Google Maps allow any Joe Schmo with a smartphone to have the world at their fingertips. Consequently, you can effectively be a cartographer of sorts, just by knowing how to best use Google Maps.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Managed IT services Cloud Computing Cortana Operations Taxes Favorites App Downloads Miscellaneous Lenovo Sports Finance Wireless Applications Networking Training Spyware Automobile LiFi Presentation Safety Deep Learning Printing Remote Workers Wires Risk Management Productivity Router Digital Payment Techology Error The Internet of Things Notes Business Intelligence Hotspot Customer Service Company Culture Computer Repair IT Consulting Wi-Fi Printer USB Time Management Vendor Management Best Practices Trending Statistics Data loss Going Green User Tips Point of Sale Google Wallet Encryption Redundancy Smartphones Test Running Cable Managed IT Service Computing Microsoft CIO Remote Worker Data Backup WannaCry PDF Authorization Social Infrastructure Instant Messaging Downtime Document Management IT Support Save Time Technology Laws Mobile Devices Uninterrupted Power Supply Private Cloud Firewall Automation Tracking Software Consulting Intranet Asset Tracking Hacker VoIP Staff Mobile Data Shortcut Passwords Chrome Gmail Mail Merge Environment Cyberattacks Consultation Alerts Apps Privacy Break Fix Cooperation Gadgets Virus BYOD Operating System Ransomware Specifications Microsoft Excel Scary Stories Financial Data Management Artificial Intelligence IT service Antivirus Cookies Data Breach Web Server Permissions Proactive Search Mobile Computing Employer-Employee Relationship Websites Avoiding Downtime Administrator IT Budget Undo User Error Windows OneNote ROI Bandwidth Email Hardware Outlook Permission Managed IT Services Social Networking Retail Network Security Fleet Tracking Cleaning Business Management IT Technicians Fun Cabling Managed Service Mobile Security Troubleshooting Dark Data Alert VPN Office 365 Managing Stress Current Events Holiday Disaster Recovery Outsourced IT IT Services Modem Procurement Windows 10 Education 5G Botnet Computer Care Sync Collaboration Processors Tech Terms High-Speed Internet IoT Workplace Tips Co-managed IT Theft CCTV Data Recovery Upgrade Utility Computing Server Management Solid State Drive Twitter Regulations End of Support Screen Reader Customer Relationship Management Small Business Authentication Internet of Things Bitcoin E-Commerce Licensing Cyber Monday Tip of the week Server Office Cybercrime Address Tech Support Comparison Firefox Google Calendar Paperless Office Machine Learning Employees User Legislation Halloween Consumers VoIP Digital Cost Management Backup and Disaster Recovery SaaS Saving Time Users Public Cloud Hacks Zero-Day Threat Bring Your Own Device Conferencing Computer Hacking Password Mobile Office Management Quick Tips Staffing Electronic Medical Records Backups Motherboard Bluetooth Read Only Big Data IT Consultant Google Maps Computing Infrastructure Smart Tech Google Drive Microsoft Office Administration Law Enforcement Alt Codes Distributed Denial of Service Remote Computing Phishing Data Patch Management Legal PowerPoint Upgrades Supercomputer Windows 7 Efficiency Tablet Virtual Reality Settings Files Business Owner Mirgation Tip of the Week Development Analytics Domains IT solutions Disaster Software as a Service Data storage Windows 8 Phone System Save Money communications Budget History Hosted Solution Language Data Warehousing Unified Threat Management GPS Politics BDR Hiring/Firing Unified Threat Management Technology Tips Apple Managed Service Provider Analyitcs Internet Exlporer Software Tips Laptop Government Digital Signature Information Blockchain Application Monitoring Star Wars Migration Cables Marketing Mobile Device Crowdsourcing Buisness Proactive IT Vulnerabilities Electronic Health Records Update Emoji Multi-Factor Security Documents Business Computing Bookmarks Facebook Maintenance Identities Best Practice IT Management Backup Help Desk Hosted Solutions Wireless Technology Superfish Cloud Telephone Systems Black Friday Data Security Virtual Desktop Technology Mouse Network Management Webcam Robot Hard Drive Chatbots Work/Life Balance Chromebook Innovation Mobile Device Management Remote Monitoring and Management Motion Sickness Tech Term Lithium-ion Battery IP Address Personal Information Google Black Market Malware Business Growth Travel Heating/Cooling Hackers Cryptocurrency Display Entrepreneur Competition 3D Printing Database Knowledge WPA3 Website eWaste Enterprise Resource Planning Disaster Resistance Project Management Wasting Time Compliance IT Support Telephony Internet Saving Money Two-factor Authentication Vulnerability Geography Network Servers Augmented Reality Business Continuity Nanotechnology Scam Virtual Assistant Professional Services Monitors Recovery Social Media Virtual Private Network Notifications Humor Employee-Employer Relationship Cybersecurity Unified Communications Identity Theft Computers Piracy Recycling Money Features Office Tips Identity Public Speaking Refrigeration Experience Cache Drones Smart Technology Business Healthcare File Sharing Word Access Control Mobile Device Managment How To YouTube Communication Hard Drives Programming Writing Physical Security Managed IT Smartphone Enterprise Content Management Storage Wearable Technology Fraud Security Content Filtering Mobility Health Touchscreen Corporate Profile Business Technology Relocation WiFi Spam Net Neutrality How To Typing Mobile Network Congestion Human Error Productivity Connectivity Windows 10 Android Virtualization iPhone Information Technology Managed Services Provider Cameras Unsupported Software SharePoint Gadget Samsung Hard Disk Drive G Suite HIPAA Meetings Assessment Remote Monitoring Dark Web Voice over Internet Protocol Browser IBM Social Engineering Flexibility RMM Security Cameras Google Docs MSP

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...