Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Downloading an application on an Android device is fairly simple: access the Google Play store, find the app you want to download, and press the button that says install. However, it is also too easy to simply hit ‘Allow’ once the app starts asking for ambiguously-worded permissions. Today, we’ll examine what these permissions actually mean.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Tech Support Gmail Operations Mobile Device Test Mobile Devices Backup Servers Employee-Employer Relationship Writing Theft Electronic Health Records Smartphone Hackers Unsupported Software VPN 3D Printing Lenovo Emoji Wi-Fi Password Antivirus Vulnerability WannaCry Motion Sickness User eWaste Internet Digital Payment Buisness Small Business Staffing Analytics Bitcoin Company Culture High-Speed Internet Business Management Apple Social Engineering Patch Management Business Growth Disaster Resistance Technology Automation Gadgets Procurement Business Intelligence Two-factor Authentication Display IT solutions Monitoring Mail Merge PDF Hacker Money Efficiency IP Address Hardware Virtual Desktop IT Budget Avoiding Downtime Internet of Things Private Cloud Cameras Computer Care Hosted Solution Social Downtime Shortcut Wires Regulations Refrigeration VoIP Work/Life Balance Browser Downloads Domains Dark Web Gadget Education Productivity Hard Drive Entrepreneur Information Identities Managed Service Provider Mobile Email IT service Documents Virtual Reality Managed IT Network Security Healthcare IT Management Superfish Applications Drones Firefox Presentation User Error CIO Travel Zero-Day Threat iPhone Remote Monitoring Scary Stories Alerts Running Cable Office Customer Relationship Management Data Management Sync SharePoint Encryption Remote Workers Fraud Point of Sale Bandwidth Files Read Only Data Breach Hosted Solutions Google Maps Digital Signature Big Data Cybersecurity Bring Your Own Device Google Calendar Disaster Recovery Help Desk Business Computing Robot User Tips Distributed Denial of Service Computer Apps Retail Law Enforcement Managing Stress Business Technology Error Social Networking Software Upgrade Application Security Tip of the week Vulnerabilities Save Time Project Management Black Friday Botnet IT Support Internet Exlporer Government Data storage Deep Learning Data Security Chrome Microsoft Office IoT Staff Document Management Google Drive Compliance Content Filtering Tablet Miscellaneous Cookies Connectivity Facebook Employees Spyware Cyberattacks Favorites Server Customer Service Going Green Access Control Paperless Office BYOD Net Neutrality Employer-Employee Relationship Analyitcs Passwords Maintenance Managed IT services Communication E-Commerce Cleaning Chromebook Samsung Unified Threat Management Workplace Tips Firewall Mobile Security Windows 8 Hacks Server Management Migration Environment Relocation File Sharing Marketing Alert Data App Microsoft Excel HIPAA Technology Tips Assessment Troubleshooting Social Media Update Upgrades Data Recovery Remote Worker Corporate Profile Telephone Systems VoIP Mobile Data Website Web Server Management Android SaaS Supercomputer Administration Backup and Disaster Recovery IT Consultant Spam Saving Time Legislation Printer Computers Time Management Data loss Specifications Current Events Cabling Permission BDR Bluetooth Sports Twitter Software as a Service Conferencing IT Support How To IT Technicians Microsoft PowerPoint Recovery ROI Hotspot Finance Digital Black Market Geography Consumers Solid State Drive Notifications Mouse Proactive IT Meetings Telephony Comparison Tech Term WPA3 Remote Monitoring and Management Vendor Management Windows Backups Quick Tips Utility Computing Undo Permissions Hard Drives CCTV Piracy Flexibility Smartphones WiFi Authorization Proactive Electronic Medical Records Augmented Reality Network Congestion Webcam Processors GPS Security Cameras Google Wallet Business Business Continuity Virus Mobility Training Authentication Lithium-ion Battery OneNote Touchscreen End of Support Safety Public Speaking Heating/Cooling Intranet Enterprise Content Management Mobile Device Managment Identity Theft Cables Phone System Administrator Scam Development Saving Money Best Practices Innovation Windows 10 Phishing Cortana Language Best Practice Features Holiday LiFi RMM Techology Address Office 365 Statistics Monitors Consultation Save Money History Uninterrupted Power Supply Cryptocurrency Outsourced IT Managed Service Computer Repair Programming Fun Storage 5G How To Data Backup Software Tips Tech Terms Wireless Technology Screen Reader USB Multi-Factor Security Information Technology Instant Messaging Hacking Star Wars Word Managed IT Service Legal Users Operating System Google Docs Data Warehousing Unified Communications Budget Search Cloud Competition Taxes Infrastructure Cost Management Cyber Monday Computing Infrastructure Machine Learning Human Error Network Management Tracking YouTube Productivity Nanotechnology Artificial Intelligence Unified Threat Management Windows 10 Humor Chatbots Managed Services Provider Wireless Public Cloud Outlook IT Services Cooperation Technology Laws Collaboration Cloud Computing Router Financial Managed IT Services Automobile Cache Recycling Mobile Office Remote Computing IT Consulting Network Business Owner Risk Management Virtual Private Network Google Settings Mobile Device Management Health Websites Mirgation Laptop Office Tips Disaster Redundancy communications Tip of the Week G Suite Modem Knowledge Computing Licensing Dark Data Fleet Tracking Halloween Mobile Computing Bookmarks Hard Disk Drive The Internet of Things Hiring/Firing Trending Smart Tech Co-managed IT Break Fix Wearable Technology Physical Security Experience Motherboard Identity Alt Codes Politics Personal Information Privacy Malware Consulting Typing Cybercrime Blockchain Ransomware IBM Crowdsourcing MSP Smart Technology Asset Tracking Networking Virtualization Enterprise Resource Planning Printing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code