Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Free Tool Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_pc_wifi_hot_spot_400.jpgWe’ve all had those moments where you desperately need a WiFi signal. Without one, how will you check your email? If you have a PC with a wireless card, you can take advantage of Connectify to turn your PC into a WiFi repeater, effectively extending your hotspot’s signal. With everyone looking to take advantage of wireless technology, a WiFi signal is necessary; so here’s how to make it a little better.

Continue reading

Stop Ignoring Unneeded Applications That Take Up Space on Your Network

b2ap3_thumbnail_trash_apps_to_improve_performance_400.jpgThere’s a value to having a neat and tidy office where everything is where it’s supposed to be. In addition to seeing a boost in productivity because you’re not having to fight clutter, you just feel good about working in a space that’s clean and orderly. These same principles of organization apply to your company’s network.

Continue reading

How to Find Greater Success By Reading More Books

b2ap3_thumbnail_read_with_spead_400.jpgAs a business leader, you know that you should read more about the latest industry trends and helpful management concepts. How's that going for you? For many business owners, finding time just to run their business is difficult enough, making book reading a luxury. We've found that you can do both by learning how to speed read.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Co-managed IT Dark Data Social Engineering IoT Computing Infrastructure Hackers Network Remote Computing Language Permissions Consultation Infrastructure Connectivity Software Tips Personal Information Documents Quick Tips GPS Safety Hotspot Marketing Information Technology Unified Threat Management Chromebook Cloud Recycling App Network Management Webcam Managed IT services Legal Storage Analytics Network Security Software as a Service Password IP Address Migration Favorites Point of Sale Politics Tip of the week Business Owner Laptop Healthcare Android Encryption IT Services Mobile Security Display Test Notes Save Money Files Consumers Time Management Managed Service Provider Scary Stories Tech Term Programming Mobility Hosted Solution CIO Remote Worker communications Read Only Small Business IT service Chatbots Disaster Identity Collaboration Best Practice Networking Error Google Router Paperless Office Competition Physical Security Data loss File Sharing Computers iPhone Enterprise Resource Planning Going Green Alt Codes Crowdsourcing Cybersecurity Conferencing Permission Managed IT Services Health Management Machine Learning Identities IT Technicians Wi-Fi Update Miscellaneous Managed Services Provider Cache Sync Virtual Desktop Law Enforcement Best Practices Spyware Technology Laws Monitoring Malware Voice over Internet Protocol Cloud Computing Google Maps Network Congestion User Error Business Intelligence Staff Google Drive PDF Microsoft Emoji Cooperation OneNote The Internet of Things Halloween Tip of the Week Managed IT eWaste Trending Access Control Business Growth IT Budget Cookies Hacker Wireless Technology Google Calendar Screen Reader Internet Bluetooth Sports Disaster Recovery Digital Payment Financial Microsoft Office Mail Merge Procurement Hard Disk Drive Address IT Support Refrigeration Cost Management IT Support Shortcut Workplace Tips Electronic Medical Records Privacy Mirgation Drones Technology Tips WPA3 Vendor Management Buisness LiFi Cybercrime Printer Chrome Saving Money Mobile Computing Uninterrupted Power Supply Cameras HIPAA Hard Drives Virtualization Analyitcs Robot Heating/Cooling Entrepreneur Productivity Apps G Suite Communication Remote Workers Phone System Administrator Efficiency Server Employer-Employee Relationship Augmented Reality How To How To Project Management VoIP Domains Deep Learning Utility Computing Managing Stress Blockchain Security Cameras Artificial Intelligence Unified Threat Management Settings Notifications Holiday Smartphones YouTube Fleet Tracking Smart Technology Risk Management Proactive Education Bandwidth Twitter Writing SharePoint Digital Company Culture VPN Bookmarks PowerPoint Windows 10 WiFi Net Neutrality Assessment Managed Service Patch Management 3D Printing Mobile Office User Wasting Time Superfish Managed IT Service SaaS Two-factor Authentication Work/Life Balance Hacking Compliance Help Desk Software Monitors Cables Taxes Motion Sickness Social Saving Time Data Breach Instant Messaging Multi-Factor Security Phishing Windows Tech Terms USB MSP Scam Virus Consulting Office Recovery Avoiding Downtime Hardware Hard Drive Star Wars Email Human Error Dark Web Environment Retail Piracy Telephone Systems User Tips Automobile Knowledge Development Business Computing Ransomware Microsoft Excel Data Security Facebook Proactive IT Office Tips Alert IT Management Tracking Comparison Cleaning Social Networking Public Cloud Social Media Administration Business Management Legislation Zero-Day Threat Applications Break Fix Money Word Training BDR Intranet Professional Services Document Management Web Server Outlook Modem Operating System Internet Exlporer E-Commerce Automation Black Market Google Docs Virtual Reality Hacks Browser Content Filtering Undo Internet of Things Vulnerabilities Telephony Innovation Digital Signature Specifications Business BYOD Windows 7 Application Backup Distributed Denial of Service Virtual Private Network Operations Save Time Budget Computer Repair Corporate Profile Public Speaking Mobile Data ROI Firefox Data storage Users Gadgets CCTV High-Speed Internet Unified Communications Technology Antivirus Wearable Technology Data Backup Disaster Resistance Cortana Data Nanotechnology Smart Tech Printing Data Management Business Continuity Mobile Device Managment Bitcoin Firewall Smartphone Customer Service Backups Mobile Unsupported Software Search Flexibility Black Friday Apple VoIP Licensing 5G Google Wallet Windows 8 RMM IBM Supercomputer History Spam Hosted Solutions Productivity Cabling End of Support Travel Wires Humor Passwords Fun Typing Solid State Drive Cyber Monday Bring Your Own Device IT solutions Tablet Customer Relationship Management Running Cable Gmail Experience Relocation Processors Security WannaCry Touchscreen Computer Mobile Devices Wireless Regulations Authentication Identity Theft Upgrades Samsung Downtime Gadget Features Computing Authorization Database Websites Computer Care Remote Monitoring and Management Information Finance Geography Current Events Mobile Device Presentation Hiring/Firing IT Consultant Enterprise Content Management Redundancy Remote Monitoring Electronic Health Records Backup and Disaster Recovery Private Cloud Statistics Office 365 Theft Cyberattacks Maintenance Outsourced IT Mouse Employees Employee-Employer Relationship Windows 10 Mobile Device Management Asset Tracking Business Technology Government Big Data Alerts Meetings Lithium-ion Battery Servers Downloads Botnet Motherboard Troubleshooting Staffing Website Fraud Upgrade Cryptocurrency Vulnerability Tech Support Techology Virtual Assistant Data Warehousing IT Consulting Server Management Lenovo Data Recovery

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...