Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Enable Gmail’s New Undo Send Feature to “Time Travel”

b2ap3_thumbnail_gmail_undo_send_400.jpgWe’ve all sent emails at some point that were either better left unsent, or were intended for a different recipient. With Gmail’s new Undo Send feature, you now have the power to transcend the depths of time and space to take back your thoughts… within approximately 30 seconds, that is. It’s a race against time. Are you up to the challenge?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Knowledge Privacy Personal Information Application Vulnerabilities Connectivity Upgrades Professional Services Managed Service Provider Staffing Servers Competition Healthcare Cache Managed IT Service Computer WPA3 User Tips Modem Notifications Data Management Internet of Things Troubleshooting The Internet of Things Business Management Environment Operating System Solid State Drive Permission Undo Procurement Security Cameras Gmail Private Cloud Consultation WiFi Best Practices Virtual Assistant Refrigeration Training Tip of the week Information Mirgation Spyware Co-managed IT Cybersecurity Server Management Automation Remote Workers Instant Messaging Staff Wireless Google Calendar Bluetooth Downloads Relocation Computing Domains Best Practice Storage Health E-Commerce Customer Service Efficiency Productivity Assessment Supercomputer Business Computing PowerPoint Employees Mobile Device Management Enterprise Resource Planning Web Server Display Crowdsourcing Artificial Intelligence Mouse Workplace Tips Meetings BYOD Holiday Education Cleaning Remote Worker Piracy Regulations Mobile Device Managment Word Employee-Employer Relationship Migration Administrator Entrepreneur Microsoft Email Lenovo Phone System Botnet Identity Social Networking Data storage VPN Data Warehousing Update Tech Support Business Owner Hosted Solution Administration Emoji Mobile Windows Remote Monitoring and Management Alert Shortcut Infrastructure Hard Disk Drive App Hardware Office 365 User Error Superfish Authentication Cybercrime Uninterrupted Power Supply Managed Services Provider Motion Sickness Consumers Managing Stress Wasting Time Intranet Settings Social Asset Tracking Recycling Cloud Disaster Recovery Vulnerability Theft Wi-Fi Heating/Cooling eWaste Downtime Remote Monitoring Monitors Read Only Zero-Day Threat Smart Tech Microsoft Office Fraud Mobile Office Licensing Websites Facebook Analyitcs Corporate Profile Smartphones Browser Tip of the Week Motherboard Bandwidth Telephone Systems IT Support Laptop IT Management Business Technology Physical Security Legal Google Docs Cameras Managed IT Services Net Neutrality Hiring/Firing Identities 5G Mobile Device Geography Machine Learning Network Congestion Remote Computing Outlook Tech Terms Backup and Disaster Recovery Cost Management Data BDR Lithium-ion Battery Network Writing Social Media Time Management Drones Computer Repair Mobile Data Dark Data Bookmarks Office Tips Security Humor CIO Gadget Software Tips Technology Current Events Webcam Hard Drives Data Backup Business Growth Innovation Computing Infrastructure Apple Authorization Favorites Cloud Computing Statistics Company Culture Programming Sync Firewall Network Security VoIP Utility Computing Compliance Virtual Reality GPS Network Management Documents Windows 10 Collaboration Document Management Windows 10 Data loss Fun Ransomware IoT Flexibility Digital Development Point of Sale Cyber Monday Black Market Wireless Technology Techology Antivirus WannaCry Hard Drive Virtual Private Network Travel Conferencing Legislation ROI IT solutions Android Avoiding Downtime Touchscreen Voice over Internet Protocol Files Law Enforcement Safety SaaS Miscellaneous Operations Automobile Big Data Government How To Sports Gadgets Database Cookies Password Augmented Reality Cooperation Unified Communications Hackers Content Filtering Smart Technology Apps Mobile Computing Specifications Internet Hosted Solutions Microsoft Excel Employer-Employee Relationship Cyberattacks Business Intelligence Managed IT services Features Applications Wearable Technology Money MSP SharePoint Typing Website Finance Networking Information Technology Star Wars RMM Spam USB Deep Learning Management Virtual Desktop Computer Care Error Productivity Virtualization Recovery Trending Language Saving Money IT Budget VoIP Politics Running Cable Mail Merge Enterprise Content Management High-Speed Internet Google Drive Small Business Data Security Unsupported Software Save Time Financial Electronic Health Records Twitter Google Unified Threat Management Communication Buisness Mobile Devices Data Recovery Samsung Social Engineering Blockchain Identity Theft Office IT Consultant Software Alerts Software as a Service IBM Black Friday Redundancy Dark Web Save Money Windows 8 G Suite Scary Stories Backups Hacker Permissions Technology Tips Printer Firefox Digital Payment YouTube Cables Passwords Fleet Tracking Mobile Security Tablet Disaster IP Address Processors Business Wires Public Cloud Multi-Factor Security 3D Printing Printing IT Support Data Breach Managed IT Electronic Medical Records Address OneNote IT Services Encryption Risk Management Comparison Router Telephony Hacking Going Green Alt Codes Test User Halloween Bitcoin Project Management Cortana Backup Internet Exlporer Robot Outsourced IT Phishing Scam Unified Threat Management Hacks LiFi Customer Relationship Management Computers Patch Management Hotspot Search Business Continuity Digital Signature Upgrade Screen Reader Cabling HIPAA Smartphone History Human Error CCTV Two-factor Authentication End of Support Budget IT service Experience IT Consulting Retail Chatbots Marketing Tracking Bring Your Own Device Managed Service Public Speaking Virus How To IT Technicians Maintenance Windows 7 Chromebook iPhone Users Work/Life Balance Consulting Access Control Cryptocurrency Monitoring Proactive IT Help Desk Disaster Resistance Quick Tips File Sharing Malware Distributed Denial of Service PDF Notes Saving Time Chrome Presentation Google Maps Tech Term Paperless Office Mobility Google Wallet Nanotechnology Analytics Technology Laws Taxes Proactive communications Vendor Management Server Break Fix

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code