Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Enhancements Made to Google Maps

Enhancements Made to Google Maps

Google Maps is a neat service that helps users navigate during their travels, but more upgrades are being released all the time to augment their experiences. Some of the most recent updates have provided additional functionality that can provide users with even more ways to use Google Maps--particularly in regard to actually making it to their destination on time and in style.

Arriving On Time
The Commute tab in Google Maps can show the user information about their preferred route, and it can even update itself if any disruptions occur during the travel time. Google Maps can then show other routes free of disruptions that might be helpful for the user. All these features combine to give the user the best experience possible when trying to stay true to a timetable.

Assuming you have two possible routes to your destination--one going through an urban area and another going around the outside--Google Maps could suggest which option is the most efficient based on data collected. If the city traffic is locked up, or if there is an accident, it can indicate which path would be better for your needs.

If public transportation is more your thing, Google has included an occupancy for trains and buses in some regions, including updates for the routes. If you want to grab something quick to eat before getting on the train, Google Maps can tell you if there is enough time to do so.

Music Makes a Commute Better
Google Maps also has built-in support for popular music services like Spotify, Google Play Music, and Apple Music. This lets users improve the quality of their commute without jumping between apps.

What are your thoughts on the most recent additions to Google Maps? Let us know in the comments, and be sure to subscribe to our blog.

Technology Basics: Bare Metal Restore
Fileless Malware Attacks Increasing
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Privacy Tech Term Business Computing Hackers Productivity Data Data Backup IT Support Software Android Innovation Efficiency Business Management Malware User Tips Data Recovery Google Computer Cybersecurity Internet Collaboration Email Communications Smartphone Windows 10 Backup IT Services Cloud Small Business Phishing Communication Ransomware Managed IT Services Mobile Device Hosted Solutions Artificial Intelligence Business Technology Social Media Facebook Hardware BDR VoIp Microsoft Office Browser Applications Blockchain Cloud Computing Mobile Devices Access Control Office 365 Information App Mobile Device Management IT Management Business Automation Outsourced IT Cybercrime Managed Service Cost Management Smartphones Maintenance Data Management Managed IT Services Encryption Websites Saving Money Disaster Recovery Server Two-factor Authentication Network Workplace Tips Hard Drive Holiday Patch Management Microsoft Data Security Update Scam Antivirus Passwords Apps Gadgets Bandwidth Remote Monitoring Windows Tech Terms Healthcare Gmail Users SaaS Printer Project Management Start Menu Laptop Internet of Things Managed Service Provider Vendor Conferencing Document Management Save Money Google Maps Analytics Alert Data loss Hacking Apple Business Continuity VPN Law Enforcement Money Vulnerability Quick Tips Data Breach Search Spam Cooperation Vulnerabilities Bitcoin Operating System Mobility Big Data Word Saving Time Augmented Reality Touchscreen Digital Social Engineering Data Protection Fileless Malware Best Practice Twitter Vendor Mangement Electronic Medical Records IT Support Medical IT Computing Infrastructure YouTube Content Managed IT Error Social email scam Regulations Fake News Download Bookmark Wireless Virtual Reality Screen Reader Government Access Miscellaneous Consultant iPhone History VoIP Addiction Software License Wireless Headphones BYOD Directions Unsupported Software Mobile Security Comparison Business Mangement Health IT PowerPoint Networking Legislation Computer Care Excel Settings Company Culture Google Calendar Telephone Router Accountants Upload Browsers Legal Running Cable Spyware Tech HTML SharePoint IBM Machine Learning Proxy Server Cleaning Administration Microchip Paperless Office Specifications Solid State Drive Professional Services Business Cards Virtualization Tip of the week Identity Theft Outlook Social Network Modem eWaste Training Microsoft Excel Tablet Software as a Service Trends Downloads Cabling Monitoring Term Virtual Assistant Disaster Distributed Denial of Service Corporate Profile Time Management Network Management Help Desk Information Technology Computers Employer-Employee Relationship Travel Processor Upgrades Multi-factor Authentication Database Emergency Television Sports Samsung Desktop Chromebook Google Docs Password Customer Resource management SSID Robot Equifax Cryptocurrency How to Gamification Entertainment Unified Threat Management Management Google Play Devices Freedom of Information Service Level Agreement Vendor Management Mobile Technology Nanotechnology Cortana Username Navigation Device security Tactics Mouse Uninterrupted Power Supply Google Drive Downtime Emails Unified Communications Backup and Disaster Recovery Redundancy Budget Telephone System Startup Audit Virus Data Analysis Worker Computing Automobile Security Cameras Hard Drive Disposal Compliance Knowledge News Unified Threat Management Going Green WiFi Printing Evernote Telephone Systems Website Voice over Internet Protocol DDoS Telephony User Tip Piracy Bluetooth Office Printers Office Tips Regulation Retail CrashOverride Windows 10 Managing Stress Marketing Multi-Factor Security

Latest Blog

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.