(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Seven Extensions to Add to Chrome

Google Chrome is the most popular web browser in the world, and for good reason. The browser has many useful features, largely due to the user’s ability to install ‘extensions’--applications that add to the browser’s functionality or the user’s experience. Once an extension is added to the browser’s toolbar, it is ready for the user to use whenever they need.

Here are a few examples of Chrome extensions that offer a user a useful function.

Select and Speak (SpeakIt!)
By leveraging the human-quality text-to-speech abilities of iSpeech, Select and Speak (SpeakIt!) can read out any text that has been selected in the browser. The user can select a language from a considerable list and adjust the voice and speed of the program to make the best use of the reader for their needs. However, this extension is clearly annotated as being for personal use, so make sure to contact the developer to obtain a license to use it in any other fashion.

Download Select and Speak (SpeakIt!) here:

It isn’t uncommon for many jobs to require an employee to read articles online. It also isn’t uncommon for a user to suddenly realize that the article they’ve committed to reading is considerably longer than first estimated. Readism takes the guesswork out of the user’s hands by scanning a page for content and delivering an estimated reading time.

Download Readism here:

How often do you do your shopping online? If you’re like many people, it’s fairly frequently. Honey gives you an added bonus as you shop online by providing you with coupon codes for the site you’re browsing. Honey currently supports retail sites in the U.S., Canada, Australia, the United Kingdom and India, plus global websites--and more websites are always being added to their databases. For the avid online shopper, Honey helps keep money in your pocket and the balance on your credit card down.

Download Honey here:

Shortened URLs can be a double-edged sword. On the one hand, they make it more convenient to browse the Internet, but they can also be used to hide URLs that could put you and your system at risk. This extension, as its name states, will un-shorten shortened URLs and check them for malware, giving you a clearer picture of exactly where the link will send you. This extension even removes known tracking cookies from the URL, keeping you that much safer.

Download Unshorten.Link here:

ColorZilla is a comprehensive tool for analyzing the color of web content, giving you the code for the precise shade and hue you find. With a color picker, eyedropper and gradient generator included in the same tool, ColorZilla gives you a clearer view of what you’re looking at, without taking up too many of your resources.

Download ColorZilla here:

As a session and bookmark manager, SessionBuddy helps to avoid browser clutter and frees up your computer’s memory. By saving open tabs, this extension allows you to restore your tabs after a crash or unexpected shutdown.

Download SessionBuddy here:

MightyText - SMS from PC & Text from Computer
This extension effectively turns your Chrome browser into another means of sending SMS and MMS messages. Any messages and texts you send will still be transmitted using your phone, and therefore, its number. What makes this extension different is the fact that you can still use your smartphone to text as well.

Download MightyText - SMS from PC & Text from Computer here:

Google Chrome is constantly improving with each new extension that is added to help its users. Which extensions do you feel are most valuable? Which ones should have made our list? Leave a comment to let us know!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Business Continuity Workplace Tips Network Data Disaster Recovery Upgrade Innovation Software Hardware Email Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management User Tips Smartphones Browser Network Security Microsoft Office Virtualization WiFi Android Managed IT Services Windows 10 Holiday Smartphone communications Operating System Mobile Computing BYOD Hacking Social Media Remote Monitoring Avoiding Downtime Application IT Solutions Small Business Outsourced IT Computers Apple Cybercrime Proactive IT Chrome Big Data Passwords Marketing Automation Ransomware The Internet of Things Data Backup Alert Office Quick Tips Budget Collaboration Information Technology spam Going Green Managed IT Services Remote Computing Recovery Social Engineering Health Employer-Employee Relationship Mobility VPN Bring Your Own Device Managed IT Save Time Firewall Vendor Management Cybersecurity Telephone Systems App iPhone Wireless Technology Gadgets User Error Mouse PowerPoint Website Excel Redundancy Phone System Content Filtering Office 365 Downtime IT Support History Tablet Retail Memory Search Office Tips Bandwidth Compliance Networking Antivirus Gmail Lithium-ion battery Private Cloud Analytics Router Safety Government Intranet Outlook Meetings HaaS Money Cloud Computing Flexibility Fax Server Artificial Intelligence Black Market Law Enforcement Data Management Solid State Drive Two-factor Authentication Administration Internet of Things Data Storage Entertainment Apps Running Cable IT Consultant Internet Exlporer Data storage Value Word Skype Windows 10 Unified Threat Management Biometrics Business Owner Mobile Office Saving Time Document Management Customer Relationship Management Risk Management Hard Drives Online Currency Best Available Facebook People Programming Printer Data Recovery Network Congestion Trending Physical Security DDoS Unsupported Software BDR Robot Current Events Google Drive Public Cloud Environment Maintenance Humor Statistics Phishing Vulnerability SaaS How To Data Security Twitter Domains Start Menu HIPAA Voice over Internet Protocol Audit IaaS Bloatware Spam Blocking Crowdfunding HBO Cleaning Customer Service Touchscreen Mobile Multi-Factor Security Screen Mirroring Entrepreneur Frequently Asked Questions Tech Support Hacker Professional Services Computer Fan Lifestyle Cast Windows Media Player Cost Management Tip of the week Shadow IT Applications Wireless Files Science Tools FENG Data Protection Productivity Streaming Media Hiring/Firing Instant Messaging Shortcut Windows Server 2008 WIndows 7 Wi-Fi SharePoint Colocation Windows 8 Workers Business Intelligence Encryption Bluetooth Windows 7 Managing Stress Sports Monitor Hosted Solution eWaste Computing Infrastructure Tablets Botnet LinkedIn OneNote Data Warehousing Virus Notifications Company Culture USB Windows 8.1 Update Regulations YouTube Reputation Wearable Technology End of Support Debate Travel IT Management Computer Accessories Social Servers NarrowBand Work/Life Balance Customers Internet exploMicrosoft Video Surveillance Root Cause Analysis IT Plan Cameras Best Practice Social Networking Flash Consultant Chromecast Patch Management Advertising Education Analyitcs Print Server Software as a Service Data loss Printer Server Settings Sync Laptop Scam Worker Commute Distributed Denial of Service Piracy Update Computer Repair Software Tips Virtual Desktop Net Neutrality IT service Human Resources Telephony User Touchpad Relocation Hybrid Cloud Licensing Virtual Reality Google Docs Samsung Computer Care Uninterrupted Power Supply Training webinar Benefits PDF Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Comparison Electronic Medical Records Techology Public Computer Specifications Employer Employee Relationship Legal Data Breach Automobile Books Emails CrashOverride Mobile Device IBM Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Users Charger Scalability Politics Transportation How to