Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Big Data Trends Can Unlock Your Business’s Potential

b2ap3_thumbnail_big_data_can_work_for_you_400.jpgBig data analytics might be changing the way businesses look at data, but how much can be changed without a deeper understanding of what causes these trends? Your business model has everything to gain from understanding why and how big data trends come to be. In essence, understanding how the trends behind big data work is arguably more important than the statistics of big data itself.

Continue reading

Unsent IE Error Reports Uncovered, You Won’t Believe Where!

b2ap3_thumbnail_old_ie_error_reports_400.jpgEven if you like Internet Explorer, you may have noticed that it can be a bit buggy at times. Perhaps if Microsoft had more information about the causes of its software issues, they could develop a better product. This is the purpose of software error reports, which largely go unsent and unread; or at least, that’s what Microsoft thought.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Antivirus Specifications Managed Service IBM Experience User Mobility LiFi Features Browser Permissions Save Time Cloud Work/Life Balance Update Touchscreen Taxes Error Upgrades Cryptocurrency Password Settings Troubleshooting Passwords Fleet Tracking Identity Theft Virtual Assistant Google Drive Vulnerabilities Encryption Tech Support Writing Mobile Device Mobile Private Cloud Microsoft Enterprise Resource Planning Windows 10 Data loss Data Security Crowdsourcing Analyitcs Apps Data Management Hard Drives OneNote Hosted Solution Microsoft Excel Storage Servers Geography Network Cybercrime Consulting Digital Business Staffing Trending IP Address Data Backup BDR Cabling Productivity Gadget Cooperation Ransomware 3D Printing Collaboration Heating/Cooling Cache Cables Customer Relationship Management Hiring/Firing Drones Remote Workers Current Events Wireless eWaste Bookmarks SaaS Utility Computing Financial Computers Remote Computing Analytics Webcam Domains Development Dark Web Managed IT services Superfish Remote Monitoring GPS Managed IT Mobile Computing IT Services Mirgation Best Practices Firewall Google Quick Tips PDF Halloween Search communications Mobile Device Managment Hacking Safety Cost Management Permission ROI Software as a Service Screen Reader Workplace Tips Infrastructure Consultation Printing IT Consulting WannaCry Backups Chromebook Database Business Owner Privacy Customer Service IT service Software Tips Education Legislation Statistics VPN Backup and Disaster Recovery Hosted Solutions IT Support Chrome Windows 8 CCTV Help Desk Law Enforcement Managing Stress Router Cloud Computing Recovery Google Calendar Finance Spam Unified Threat Management Enterprise Content Management Public Cloud Humor E-Commerce Data Application Website Google Maps Software Mobile Data Phishing Technology Tips Personal Information Office Tips MSP Windows 10 Managed IT Service Employee-Employer Relationship Piracy Computer Cyberattacks Information Patch Management Virtualization Telephony Net Neutrality Wasting Time Maintenance Display Distributed Denial of Service Instant Messaging Firefox RMM Break Fix Alt Codes Internet of Things Virtual Private Network Legal Typing Miscellaneous Electronic Medical Records Comparison Business Intelligence Security Cameras Files Social Networking Outlook Hacks Users Environment Computer Repair Fun Proactive Social Engineering Operating System Lenovo Efficiency Alerts Knowledge Programming Wearable Technology Mobile Security Undo Read Only Public Speaking Consumers Unsupported Software Business Computing Government Tablet Two-factor Authentication Wi-Fi Black Market Networking Phone System Redundancy Windows 7 IT Budget Star Wars Recycling Hacker Malware YouTube Automobile Laptop Productivity IT Consultant How To HIPAA Computer Care Uninterrupted Power Supply Smart Technology Migration Physical Security Presentation Web Server Email Voice over Internet Protocol Nanotechnology Innovation Tip of the Week Flexibility Training Applications Authorization Politics Security Electronic Health Records Staff Paperless Office Hotspot Smart Tech Botnet Motherboard Tech Term Downtime Data Recovery Marketing Healthcare Modem Data storage Bring Your Own Device Data Breach Procurement Hard Drive Project Management Business Technology Zero-Day Threat Supercomputer Fraud Google Docs Telephone Systems Server Management How To Business Growth Proactive IT Mobile Office Network Management Solid State Drive Virtual Desktop Disaster Resistance Bandwidth Apple BYOD Travel Office Administrator Mobile Device Management Black Friday Server Cyber Monday User Tips Running Cable Virtual Reality Documents IoT Asset Tracking Outsourced IT Robot Licensing Vulnerability Meetings Downloads Twitter User Error Gadgets Word Notes Wireless Technology Retail IT solutions Windows Management Risk Management Theft Processors Monitors Digital Signature Social Computing Infrastructure Competition Language Managed IT Services Data Warehousing Identities Technology Laws Machine Learning Assessment Internet Exlporer Point of Sale Lithium-ion Battery Remote Monitoring and Management Test Information Technology VoIP Administration Alert Mobile Devices End of Support Address Hard Disk Drive App Sync Vendor Management Cameras Chatbots Disaster Recovery Health IT Management Employer-Employee Relationship Communication High-Speed Internet Techology Avoiding Downtime Gmail Budget Facebook Intranet Document Management Printer 5G Upgrade Augmented Reality IT Support Bitcoin Favorites Professional Services Smartphone File Sharing Employees Microsoft Office Best Practice iPhone Tracking Identity Google Wallet Relocation Bluetooth Tip of the week Regulations Automation Cleaning G Suite Cortana Save Money Computing Tech Terms Going Green Multi-Factor Security Smartphones The Internet of Things Company Culture Network Security Unified Communications Saving Money Buisness Unified Threat Management Digital Payment Conferencing Refrigeration Shortcut Cybersecurity Blockchain Corporate Profile Artificial Intelligence Big Data Samsung Scam WPA3 Saving Time Motion Sickness Network Congestion Disaster Authentication Access Control Human Error Virus Monitoring Managed Service Provider Money Social Media Managed Services Provider Co-managed IT Android Remote Worker Emoji CIO Dark Data Operations Entrepreneur Sports Hackers Internet Office 365 WiFi Wires Websites Spyware Mouse Hardware Business Continuity History Business Management Cookies IT Technicians USB SharePoint Holiday Mail Merge Content Filtering Connectivity Technology Small Business Scary Stories VoIP Notifications Backup Compliance PowerPoint Deep Learning Time Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...