Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Apple vs Samsung: Who Makes Better Tablets?

Apple vs Samsung: Who Makes Better Tablets?

In today’s mobile-centric world, portability is becoming more and more crucial to success in business affairs. This phenomenon can easily explain why tablets are commonplace in boardrooms and briefcases. With Apple and Samsung offering two heavy-hitting tablets (the Galaxy Tab S3 and the iPad Pro), we’ve decided to analyze their features head-to-head to find out which is the supreme option for your business needs.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Simon Pierro, the “Wizard of iOS,” is a Different Kind of Magician [VIDEO]

b2ap3_thumbnail_tablet_magic_400.jpgDo you remember the good old days when a simple magic trick was capable of bringing a smile to anyone’s face? Optical illusions, card tricks, or sleight of hand; all of these are basic tactics used by the average magician. However, Simon Pierro, a German magician, uses his iPad to come up with mind-bendingly spectacular tricks that take advantage of modern technology.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Hotspot Mobile Data communications Cables Public Speaking Social Engineering Healthcare Innovation Software Tips Redundancy Lithium-ion Battery ROI Customer Service Electronic Health Records Alert Data Warehousing Alt Codes Robot Passwords IT Support Analytics Digital Signature Network Data Security Motion Sickness Computer Care File Sharing Virtual Desktop Security Cameras Processors Networking Data loss Conferencing Best Practices Troubleshooting Wires Break Fix Productivity Lenovo Programming Consultation Mobile Security Fleet Tracking Cortana Gadget Disaster Resistance Managed IT GPS Staffing Social Networking Unified Threat Management The Internet of Things Android Vendor Management Monitoring Malware WannaCry Dark Web Storage Settings Dark Data Enterprise Resource Planning IoT VoIP Humor Experience Apple Business Technology Uninterrupted Power Supply Relocation 3D Printing Budget Drones Remote Monitoring Human Error Regulations Search Apps Internet of Things Operations Procurement Business Intelligence Electronic Medical Records Hacker Google Docs Mail Merge Data Motherboard Address Tablet User Consumers Save Time Public Cloud Deep Learning Virtual Reality Files WiFi Emoji Connectivity Cabling Virtual Private Network App Holiday Consulting Tech Terms Blockchain Documents Managed Services Provider Private Cloud Managed Service Telephony Employer-Employee Relationship Hosted Solutions Halloween Network Management Star Wars Cameras Users Laptop Notifications Mobile Device Managment 5G Big Data Safety Legislation Development Physical Security Technology Tips Enterprise Content Management Software Browser Phone System Disaster Encryption Spyware Remote Monitoring and Management Proactive Superfish Technology Laws Managed IT Services Hiring/Firing IT service Modem Fun BYOD Maintenance Virtualization Network Security Mobile Device Management VoIP Backups Avoiding Downtime IT Management Hard Drives Undo Workplace Tips Telephone Systems Presentation Current Events Meetings Hardware Remote Worker Supercomputer Security Two-factor Authentication Data Recovery Permission Hard Disk Drive Employee-Employer Relationship Company Culture Mobile Device Cleaning Printer Vulnerabilities Business Growth Websites Recovery Personal Information History Facebook Wi-Fi Botnet Specifications Update Windows Computer Repair Flexibility Software as a Service Data Breach Training Government Access Control Ransomware YouTube Piracy Phishing Travel Chrome Typing Internet Exlporer Mobility Sync Cache Technology Analyitcs Black Market Microsoft Office Microsoft Excel Identities Corporate Profile Mobile Office Work/Life Balance How To Marketing Microsoft Windows 10 Firefox High-Speed Internet Project Management USB Samsung Refrigeration Office Tips Network Congestion Cybersecurity Computing Infrastructure Information Technology IT Technicians Smart Tech Data Management Google Tech Support Managing Stress Management Monitors Theft Zero-Day Threat Disaster Recovery Information Chromebook IT solutions Hosted Solution Digital Payment Website Utility Computing Google Calendar Environment E-Commerce Saving Money Privacy Mirgation Cybercrime Bluetooth Webcam Managed IT Service Chatbots LiFi CIO Authorization Router IT Support Content Filtering Cooperation OneNote SharePoint Running Cable Twitter PDF Time Management Collaboration Productivity Outsourced IT Mobile Devices Cyber Monday Patch Management Shortcut Identity Machine Learning Buisness G Suite Read Only Applications Retail Server Management Help Desk Google Wallet MSP Bookmarks Authentication Social Language Domains Vulnerability Hard Drive Remote Workers Point of Sale Business Computing IT Budget Managed Service Provider Error Tech Term Education Business Management Finance Multi-Factor Security Intranet Favorites Office Migration Employees Paperless Office Smartphones HIPAA Health Small Business Outlook Smart Technology Cookies Touchscreen Remote Computing Downloads Recycling Data Backup eWaste Cryptocurrency Smartphone Statistics Geography Scam Business Owner BDR Bandwidth Nanotechnology Fraud Wearable Technology Application Automobile Windows 10 Display Staff Backup Heating/Cooling Web Server Hacking Administrator Internet WPA3 Tracking Social Media CCTV Distributed Denial of Service Customer Relationship Management Cost Management Saving Time Hackers Co-managed IT Writing Server Artificial Intelligence Efficiency Backup and Disaster Recovery Licensing Identity Theft Antivirus Bitcoin Black Friday Politics Miscellaneous Bring Your Own Device Money Best Practice User Error Alerts Comparison Wireless Technology Word RMM Mouse Operating System Test IP Address Document Management Risk Management Cloud Computing Password iPhone Downtime IBM Infrastructure Proactive IT Unsupported Software Windows 8 Office 365 Spam Screen Reader IT Services Gmail Managed IT services Techology Asset Tracking PowerPoint Unified Communications Computers Augmented Reality Business Continuity Taxes Crowdsourcing Computer Permissions Entrepreneur How To End of Support Hacks Tip of the week IT Consulting Cyberattacks Upgrades Legal Save Money Knowledge Trending Wireless Sports Firewall Tip of the Week Instant Messaging Data storage Gadgets Competition Compliance Mobile Computing Email VPN Google Maps Assessment Business Scary Stories User Tips Google Drive IT Consultant Features Going Green Mobile Printing Unified Threat Management Upgrade Servers Net Neutrality Communication Digital Solid State Drive Quick Tips Automation Law Enforcement Financial Computing SaaS Cloud Virus Administration

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code