Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Pros and Cons of the 3D Printing Boom

The Pros and Cons of the 3D Printing Boom

Ten years ago, 3D printing was nothing but a long shot that the average consumer knew nothing about. Nowadays, printing parts with 3D printing technology for machines and some consumer goods is not only common, it’s growing more popular. All types of industries, including manufacturing, have found that 3D printing is a great way to incorporate modern technology into their current workflow.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Digital Quick Tips Ransomware Files communications Humor Microsoft Office WiFi Big Data App Avoiding Downtime Information IBM Work/Life Balance User Error Fleet Tracking PowerPoint Downloads Unsupported Software Microsoft Excel Black Market Development Google Wallet Apps PDF Backup and Disaster Recovery Google Calendar Tip of the week Hacking Upgrade Software Tips Machine Learning Hackers Cloud Computing Analytics Nanotechnology Address Entrepreneur Tip of the Week Project Management Office Tips Unified Threat Management Robot Security Cameras Utility Computing Virtual Private Network Business Technology Bitcoin How To Data Security Break Fix Wireless Technology Settings Data Proactive Best Practice Mobile Remote Monitoring and Management Vendor Management Workplace Tips Tech Terms Server Monitoring IT Budget Mobile Device 5G Browser Cloud MSP IT service Money Relocation Bandwidth Cyberattacks Cookies IT Management Star Wars Law Enforcement iPhone Managed IT services Disaster Recovery Miscellaneous Saving Time Bluetooth Current Events Instant Messaging Google Help Desk Blockchain Smartphones IT Support Botnet Update Hacks Scary Stories Vulnerability Google Drive Web Server Remote Worker Laptop Administrator Training VPN Router Proactive IT Patch Management Business Continuity Virtualization Travel Retail Automation Document Management Network Congestion Hosted Solutions Technology Tips Writing Managed Service Provider Alt Codes Operating System Marketing Identity Touchscreen Infrastructure Employer-Employee Relationship Experience Software Consumers Virtual Desktop Business Growth Legal Phone System G Suite Smart Technology Printer Buisness IT Consultant Storage Twitter Word Documents Notifications Save Time Going Green Cost Management Education OneNote Wires E-Commerce Taxes Remote Computing IT Technicians Social Engineering Mobile Devices Facebook Search Apple Geography The Internet of Things Application Employee-Employer Relationship Piracy CCTV Techology IT Services CIO Applications SaaS Small Business Intranet SharePoint Tablet Saving Money LiFi Business Data Breach IT solutions Cables Cooperation Printing Managed IT Uninterrupted Power Supply Processors Budget Social Media Firefox ROI eWaste Servers Google Maps Flexibility Email Net Neutrality Users Lithium-ion Battery Lenovo Finance Point of Sale Best Practices Error Co-managed IT Drones Windows 10 Virtual Reality Android Personal Information Technology Laws Fraud Spyware Dark Web Bookmarks Social Windows Identity Theft Public Speaking Office 365 Disaster Resistance Display Cybersecurity Webcam Virus Customer Relationship Management Data Recovery Artificial Intelligence Networking Shortcut Consulting Private Cloud Running Cable Data Backup Alerts Features IoT Risk Management YouTube Motherboard BDR Bring Your Own Device Statistics Procurement Data loss Hardware Presentation Backups IP Address Backup Business Owner Passwords Phishing Server Management Staff Smartphone USB Social Networking Innovation Cortana Identities Outsourced IT Tech Support Data Warehousing Crowdsourcing End of Support Sports Read Only Websites Managed IT Services Mobile Office Tracking Permissions GPS Data Management Windows 8 Recovery Gadgets Human Error 3D Printing Remote Workers Deep Learning Augmented Reality User Tips Network Security Financial Sync Gadget Gmail Internet Telephone Systems Maintenance Safety Hacker Distributed Denial of Service Communication Technology IT Consulting Programming Customer Service Health Refrigeration Wireless Digital Payment Data storage Environment Superfish Hotspot Hard Drive Unified Threat Management Monitors Access Control Corporate Profile Knowledge Tech Term IT Support Authorization Time Management Managed Service Electronic Health Records Chatbots Mobile Data Telephony Dark Data Regulations VoIP Password Administration High-Speed Internet Security Computer Repair Theft Information Technology Chromebook Public Cloud Mobile Security Samsung Permission Fun Wi-Fi Consultation Hosted Solution Cybercrime RMM HIPAA Cameras Licensing Firewall Enterprise Content Management Meetings Redundancy Google Docs Hard Drives Halloween Spam Conferencing Mobile Computing Website Digital Signature BYOD History Save Money Asset Tracking Zero-Day Threat Internet of Things Test Mobility Outlook Cabling Company Culture Black Friday Office Connectivity Scam Compliance Government Hiring/Firing Enterprise Resource Planning Cleaning Authentication Mobile Device Managment Computing Infrastructure Competition User Managing Stress Mail Merge Network Computer Employees Electronic Medical Records Healthcare Mirgation Malware Management Holiday WannaCry Legislation Cryptocurrency How To Hard Disk Drive Smart Tech Downtime Favorites Unified Communications Cyber Monday Antivirus Troubleshooting VoIP Undo Computer Care Software as a Service Politics Operations Physical Security Mouse Heating/Cooling Two-factor Authentication Disaster Motion Sickness Screen Reader Upgrades Trending Vulnerabilities Alert Migration Business Management Encryption Content Filtering Windows 10 Paperless Office Supercomputer Internet Exlporer Cache Comparison Modem Managed Services Provider Network Management Remote Monitoring Staffing WPA3 Computers Specifications Multi-Factor Security Managed IT Service Computing Productivity Language Automobile Microsoft Collaboration Productivity Chrome Recycling Business Intelligence Mobile Device Management Wearable Technology Efficiency Business Computing File Sharing Emoji Analyitcs Solid State Drive Typing Domains Privacy Assessment

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...