Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Will No Longer Display Results As You Type--Here’s Why

Google Will No Longer Display Results As You Type--Here’s Why

If you hadn’t yet noticed, there’s been a change made to the Google search engine that will influence how search results are presented to users. Google’s ‘Instant’ feature, introduced in 2010, is no more.

Continue reading
0 Comments

Tip of the Week: How to Search the Web Without Typing

b2ap3_thumbnail_drag_to_search_and_others_400.jpgHow fast are you at finding the information you need using Google Search? In today’s data-driven world, knowing how to effectively use Google is actually a marketable skill. Did you know that there are ways in Google Chrome to search for what you need that take less time than typing your query in the search bar?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Managing Stress Alerts Remote Worker Virtual Desktop Halloween Government Windows 10 Automation Management Virtualization Save Time Healthcare Malware Refrigeration Regulations Taxes Chromebook User Managed IT Unified Communications 3D Printing Computer Repair Features Virus Company Culture Trending Compliance Communication Facebook Social Media Risk Management Cache Apple Microsoft Excel Web Server Distributed Denial of Service Google Entrepreneur Monitoring Hacker Downtime Employees Google Drive Managed IT Services Touchscreen Hackers Storage Gadgets Techology GPS Typing Mail Merge Microsoft Managed Service Provider Google Wallet Smart Technology Office Tips Upgrades Windows 8 Internet of Things Staff Alert Electronic Medical Records Efficiency Tip of the week Virtual Reality Scam Sports Spam Managed Services Provider Supercomputer Bluetooth Language Phone System Display Smartphone Hard Drives Websites Save Money Operating System Procurement Data Management Black Market Router Budget Time Management Wireless Website Multi-Factor Security Going Green Domains Customer Relationship Management Network Management Hosted Solution Collaboration E-Commerce Social Engineering Tech Term Tech Support LiFi Business Management Private Cloud Information Technology Digital Payment Data Backup Outsourced IT Identity Theft Test Office Google Calendar Troubleshooting Travel Read Only Notifications YouTube Unified Threat Management Best Practices Smartphones Connectivity Favorites Data Warehousing Human Error Competition Backup and Disaster Recovery Data Humor Business Computing Sync Comparison Printer Gadget Disaster Recovery Employer-Employee Relationship Outlook IT Support Financial Big Data Apps Authorization Education Password Conferencing Mobile Laptop Programming Remote Computing Personal Information Hardware Corporate Profile Cybersecurity Artificial Intelligence Project Management Fleet Tracking Star Wars Relocation Business Intelligence Net Neutrality Administrator Windows Downloads Firewall Document Management communications File Sharing IT Support SaaS Current Events Hotspot Co-managed IT Error iPhone Bookmarks Network Congestion Privacy Undo Productivity BYOD Wearable Technology Knowledge Servers Cookies Phishing WiFi Alt Codes RMM Miscellaneous Asset Tracking Best Practice Recovery IT Management Backups Data storage Proactive IT Shortcut Cabling Motion Sickness Point of Sale Ransomware Law Enforcement History Mobility Virtual Private Network Wi-Fi Unified Threat Management How To High-Speed Internet Saving Money OneNote Tablet Permission Deep Learning Managed IT Service Telephone Systems Backup IT Consulting Hard Disk Drive Business Technology IT service Mouse Screen Reader Authentication VoIP Cameras Mobile Office Administration Word Bring Your Own Device Social Networking Information Operations Encryption Mobile Data Vendor Management Lithium-ion Battery Digital Vulnerabilities Cost Management Scary Stories Computer Care Patch Management Consulting Samsung Innovation Digital Signature Mobile Device Management Office 365 Documents Managed IT services Security Cameras Network Cortana Utility Computing Buisness Passwords Monitors Disaster Solid State Drive The Internet of Things Users Automobile Business Growth Hacking Identities Money USB User Error Legal Uninterrupted Power Supply Infrastructure Superfish Business Owner Black Friday Statistics Search Smart Tech Mobile Devices Identity Consultation App Fun WannaCry Help Desk Safety Business IT solutions Avoiding Downtime Browser Cryptocurrency Flexibility Hacks Finance Hosted Solutions Remote Monitoring and Management Mirgation Permissions Environment BDR Workplace Tips Holiday IoT Chatbots Technology Laws Wireless Technology Meetings Lenovo Heating/Cooling eWaste Nanotechnology Content Filtering Physical Security How To Small Business User Tips Mobile Computing Assessment Blockchain Twitter 5G Crowdsourcing Piracy SharePoint Security Social Writing Cybercrime Printing Specifications Cyber Monday Networking Remote Monitoring Electronic Health Records Vulnerability Upgrade Bitcoin Tech Terms Presentation Data loss Customer Service Enterprise Resource Planning Cloud Computing Public Speaking Disaster Resistance Mobile Device Consumers HIPAA Google Docs VPN Data Breach IT Consultant Cloud Computers Cleaning Health Modem Hard Drive Saving Time Work/Life Balance Mobile Security Geography PowerPoint Webcam IT Budget Internet Exlporer Cables Network Security Augmented Reality Tracking Retail Proactive Instant Messaging WPA3 Staffing Public Cloud Computing Server Google Maps Training Managed Service Quick Tips IBM Hiring/Firing Migration Telephony Wires Licensing Chrome Software Address Botnet IT Services Recycling Analytics Zero-Day Threat Employee-Employer Relationship Cooperation Software as a Service Technology Tips Development Server Management Spyware Computer Data Security Theft Android Productivity Redundancy Running Cable MSP IT Technicians Internet Software Tips Paperless Office ROI Analyitcs Break Fix Marketing Mobile Device Managment Technology Tip of the Week Machine Learning VoIP PDF Remote Workers Gmail Antivirus Motherboard Robot Dark Data CIO Email Windows 10 Experience Maintenance Business Continuity Update Files Enterprise Content Management Settings Cyberattacks IP Address Data Recovery Two-factor Authentication Fraud Application Computing Infrastructure Politics End of Support Bandwidth Legislation Microsoft Office Processors Dark Web G Suite Unsupported Software CCTV Access Control Drones Applications Intranet Firefox Emoji

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code