Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Free Tool Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_pc_wifi_hot_spot_400.jpgWe’ve all had those moments where you desperately need a WiFi signal. Without one, how will you check your email? If you have a PC with a wireless card, you can take advantage of Connectify to turn your PC into a WiFi repeater, effectively extending your hotspot’s signal. With everyone looking to take advantage of wireless technology, a WiFi signal is necessary; so here’s how to make it a little better.

Continue reading
0 Comments

Stop Ignoring Unneeded Applications That Take Up Space on Your Network

b2ap3_thumbnail_trash_apps_to_improve_performance_400.jpgThere’s a value to having a neat and tidy office where everything is where it’s supposed to be. In addition to seeing a boost in productivity because you’re not having to fight clutter, you just feel good about working in a space that’s clean and orderly. These same principles of organization apply to your company’s network.

Continue reading
0 Comments

How to Find Greater Success By Reading More Books

b2ap3_thumbnail_read_with_spead_400.jpgAs a business leader, you know that you should read more about the latest industry trends and helpful management concepts. How's that going for you? For many business owners, finding time just to run their business is difficult enough, making book reading a luxury. We've found that you can do both by learning how to speed read.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Managed Service Administrator eWaste Social Engineering Maintenance Alert Downloads Budget Browser Unified Communications Upgrades Virtual Desktop Digital Payment Security Heating/Cooling Remote Workers Software Tips Troubleshooting How To Efficiency User Machine Learning IBM Features Consulting Electronic Medical Records G Suite Webcam Business Management Legal Favorites Information Technology Mobile Mobile Data Multi-Factor Security Disaster Sync Communication Asset Tracking Financial Theft Windows 10 Data Security Hosted Solutions Cost Management Smart Tech Infrastructure Patch Management Break Fix Lenovo Cybersecurity Data Backup Smartphones Modem USB WPA3 Refrigeration Productivity Risk Management Best Practice Cyber Monday Chromebook Solid State Drive Unified Threat Management Deep Learning Hard Drive Spyware VPN Employees Android Electronic Health Records Nanotechnology Microsoft Office Google Docs The Internet of Things Hiring/Firing IT solutions Internet Managing Stress Analytics Wearable Technology Identities Specifications Documents Cables Digital Big Data Antivirus Miscellaneous Recycling Cache Quick Tips Access Control Gadgets Windows 8 Experience Relocation Current Events Mobile Computing Windows 10 Disaster Resistance IT Support Environment Backup Buisness Office Tips Managed IT services Mail Merge Malware Competition Alt Codes Information IT Management Outsourced IT Health Update Automation 3D Printing Vulnerability App Touchscreen Blockchain Zero-Day Threat Law Enforcement HIPAA Vendor Management Word Router Microsoft Excel Microsoft Gadget Safety Licensing Operating System Bookmarks Applications Phone System Computer VoIP Computers Instant Messaging Innovation Hacker BYOD Data Recovery IT Consulting Healthcare SharePoint Writing IT Consultant Computing Infrastructure Business Computing Firefox Best Practices Network Management Mobile Device Star Wars Hacking End of Support Government Managed Service Provider Firewall Cortana Disaster Recovery Software as a Service Hosted Solution Mobile Office Money Co-managed IT Distributed Denial of Service Network Security Gmail CIO Computer Care Remote Computing Enterprise Content Management High-Speed Internet Email Virtual Private Network Vulnerabilities Backup and Disaster Recovery Downtime Google Wallet Wireless How To Politics Authentication Travel Social Managed IT Services Presentation Hotspot Migration Supercomputer Cabling Mobile Device Managment Public Speaking Managed IT Apple Administration Cyberattacks Avoiding Downtime History Server Management Bitcoin Permissions Customer Relationship Management IoT Spam Permission Robot Twitter Hardware Office 365 Consumers Workplace Tips Network WiFi Fun OneNote Users Humor 5G CCTV Two-factor Authentication Development Cloud Computing Work/Life Balance Smartphone IT Services Flexibility Google Calendar Save Time Intranet communications E-Commerce Consultation Mobile Security Small Business Paperless Office SaaS Staffing Remote Monitoring Entrepreneur Data Management Education Website Bring Your Own Device Running Cable Data Breach Black Market Tip of the Week Technology Laws IP Address Wireless Technology Operations Cooperation Personal Information Google Drive Motion Sickness Time Management Recovery Drones Undo WannaCry ROI IT Technicians Remote Monitoring and Management Saving Money Hackers Software Business Growth Fleet Tracking Net Neutrality Notifications Business Technology Analyitcs Superfish LiFi Company Culture Save Money Tablet Printing Processors Marketing Encryption Cloud Windows Connectivity Scam Virtualization Compliance Hacks Dark Data Identity Theft Programming IT Budget Mouse Dark Web PowerPoint Productivity BDR Cameras IT Support MSP Cookies RMM Tech Term Read Only Mirgation Ransomware Wires Data IT service Business Owner Private Cloud Human Error Application Crowdsourcing Help Desk Legislation Typing Internet Exlporer Server YouTube Authorization Chatbots Data loss Samsung Chrome Management Proactive IT Telephony Collaboration Conferencing Servers Phishing Facebook Cryptocurrency Cleaning Managed Services Provider Trending Computer Repair Knowledge User Tips Business Continuity Assessment Remote Worker Business Intelligence Meetings Saving Time Files Botnet Network Congestion Internet of Things Alerts Artificial Intelligence Test Sports Backups Web Server Piracy Holiday Statistics Domains Point of Sale Employee-Employer Relationship Unified Threat Management Going Green Tech Support Emoji Telephone Systems Augmented Reality Address Geography Cybercrime Wi-Fi Scary Stories Technology Tips Fraud Shortcut GPS File Sharing Computing Unsupported Software Smart Technology User Error Utility Computing Hard Disk Drive Data Warehousing Search Employer-Employee Relationship Finance Printer Bluetooth Digital Signature Retail Hard Drives Display Privacy Websites Mobile Devices Settings Office Mobility Technology Techology Error Security Cameras Project Management Public Cloud Tech Terms Motherboard Corporate Profile Tracking Staff Managed IT Service Laptop Identity Virus Document Management Enterprise Resource Planning Apps VoIP Social Media Redundancy Monitors Training Halloween Content Filtering Networking Physical Security Storage Regulations Virtual Reality Language Black Friday Uninterrupted Power Supply Comparison Passwords Lithium-ion Battery Monitoring Screen Reader Business Mobile Device Management Taxes Upgrade Password Outlook Proactive Tip of the week Bandwidth Google PDF Automobile Google Maps iPhone Customer Service Procurement Data storage Social Networking

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code