Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

Continue reading
0 Comments

Why You Shouldn't Say “Humbug” to Your Security

Why You Shouldn't Say “Humbug” to Your Security

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

Continue reading
0 Comments

How Technology Could Change the Classroom

How Technology Could Change the Classroom

Children are the future, as the saying goes, so do we really want the future to be taught using tools from the past? While some schools are still using technology that better belongs in the 20th century, others are embracing innovation and teaching in ways that better translate to the “real world.” Let’s take a look at how our evolving technology is transforming the classroom and explore some ways to get it to more students.

Continue reading
0 Comments

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

WPA3 Work/Life Balance IT solutions High-Speed Internet Public Speaking Marketing Identities Save Money IT Services Firefox Windows 10 Supercomputer Cryptocurrency Apple IT Consulting Computer Tablet Security Cameras Consumers Travel Hackers Error Compliance Zero-Day Threat Budget Infrastructure Troubleshooting Trending Unified Threat Management Cloud Computing Downloads Firewall Specifications Comparison Technology Tips Social Network Congestion E-Commerce Business Computing IoT Cleaning Data Management Taxes Programming User Error Apps Time Management Computer Repair Augmented Reality Disaster Permissions Data Warehousing Webcam Statistics OneNote Managed Service SharePoint Vendor Management Mail Merge Mirgation Assessment Mouse Internet of Things Windows USB Smartphones Microsoft Mobile Device Managment Modem Customer Relationship Management Scam Refrigeration Sync Emoji Operations User Tips Hard Drives Cortana Hacker Wireless Technology Procurement Efficiency Law Enforcement Business Management Public Cloud Piracy VoIP Tech Support Black Friday Information Voice over Internet Protocol Migration Router Touchscreen Holiday Cooperation Tech Term Maintenance Administration Staffing Windows 8 Mobile Device Legal Business Google Calendar Dark Web Hacks Quick Tips 5G Help Desk Scary Stories Data Security Productivity CIO Malware Running Cable Content Filtering End of Support Phone System Intranet Consulting Automobile Digital Signature Money Financial Microsoft Excel Tip of the Week Browser Office GPS Productivity Antivirus Safety Samsung Address Hotspot File Sharing Hosted Solution Computing Infrastructure IBM Managed IT communications Shortcut Google Backup Ransomware Wires Uninterrupted Power Supply CCTV Employee-Employer Relationship Wasting Time HIPAA Google Maps Knowledge Access Control Nanotechnology Social Engineering Internet Networking Saving Time Unsupported Software Disaster Recovery Paperless Office Cyber Monday Utility Computing Applications MSP Google Drive Smart Technology IT service Twitter Upgrade Big Data G Suite Office 365 Current Events Analyitcs Remote Monitoring Hard Disk Drive ROI Professional Services Managed Services Provider Healthcare Telephone Systems Co-managed IT User Upgrades Proactive Heating/Cooling Conferencing Data Backup Cloud Politics Cables Employees Users Cybersecurity Internet Exlporer VPN Security Typing Private Cloud IT Consultant Deep Learning Unified Communications Network Security Writing Cabling Development Human Error Management Downtime Legislation Halloween Star Wars Business Growth Alerts Computing Word Domains Network Processors Virtual Private Network Facebook Mobile Device Management Relocation Data loss Black Market SaaS Point of Sale Hardware Virtualization Geography Best Practice Electronic Medical Records Hard Drive Password Hosted Solutions Competition Cyberattacks Miscellaneous Bandwidth eWaste Spyware History Android Permission Storage Laptop Communication Mobile Office Physical Security Favorites Social Networking Superfish Servers Virus LiFi Recovery Collaboration Search Motion Sickness Managed IT Service Display Wi-Fi Solid State Drive Files Cameras Backups Mobile Computing Web Server Gmail Drones Wearable Technology Managed Service Provider Microsoft Office How To IT Budget Mobile Devices Vulnerabilities Bookmarks Spam Encryption Bluetooth Remote Worker Sports Technology Laws PDF Mobility Backup and Disaster Recovery Environment Notifications Experience Computers Digital Payment Server Management Small Business Operating System Buisness Training Websites Mobile Managed IT Services Crowdsourcing Windows 10 WiFi Business Continuity Screen Reader Distributed Denial of Service Gadgets Licensing Analytics Mobile Data Fraud Technology Patch Management Unified Threat Management PowerPoint Data Breach Education Privacy Government Project Management Software Windows 7 Software as a Service Undo Business Owner Fleet Tracking Gadget Recycling Personal Information BDR Dark Data Bring Your Own Device Information Technology Avoiding Downtime Office Tips Data Recovery Machine Learning Lenovo Electronic Health Records Authentication Artificial Intelligence Vulnerability Printing Bitcoin Cybercrime 3D Printing Lithium-ion Battery iPhone Fun Read Only Language Application Save Time Data Remote Monitoring and Management Health Innovation Chromebook Automation Employer-Employee Relationship Cookies Cost Management Software Tips Break Fix Corporate Profile Hacking Tech Terms BYOD Humor Staff Enterprise Resource Planning Tip of the week RMM Best Practices Authorization Network Management Features Settings Managed IT services Regulations Business Technology Alt Codes Telephony IT Support Digital Disaster Resistance Saving Money Instant Messaging Identity Theft Consultation Chrome Notes Entrepreneur Identity Retail Chatbots Motherboard App Multi-Factor Security Wireless Theft Cache Workplace Tips IT Management Connectivity IP Address Monitors Outsourced IT Email Remote Computing How To Risk Management Google Docs Virtual Assistant Google Wallet Social Media Mobile Security YouTube Botnet Finance Enterprise Content Management WannaCry Net Neutrality Server Printer Phishing Going Green Computer Care Alert Flexibility Customer Service Redundancy Blockchain Passwords IT Technicians Virtual Reality Documents Two-factor Authentication Meetings Tracking Presentation Administrator Website Monitoring Document Management Hiring/Firing Company Culture Test Virtual Desktop Business Intelligence Remote Workers Managing Stress Asset Tracking Robot VoIP Data storage Smart Tech Techology The Internet of Things Update Smartphone IT Support Database Proactive IT Outlook

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code