Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Gmail Gets Better with Chrome Extensions

Gmail Gets Better with Chrome Extensions

Google has contributed many useful applications and utilities to the average computer user, but one of the biggest standalone contributions that Alphabet, Inc. has made is Gmail, its email program. While this communications tool is comprehensive on its own, it only becomes more useful when paired with the right extensions. Today, we’ll review some of the ones that can best help you boost and sustain high levels of productivity.

Continue reading
0 Comments

Tip of the Week: 3 Pieces of Screen Reading Software

Tip of the Week: 3 Pieces of Screen Reading Software

Wouldn’t it be convenient if your business could have web pages or applications read out text for you so that you don’t have to? While most would consider this a luxury, these screen reading applications are an everyday occurrence to those who are blind, visually impaired, or have a learning disability. Even if you don’t have anyone in your office who needs screen reading, it can’t hurt to be prepared for a day when you might.

Continue reading
0 Comments

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Continue reading
0 Comments

Is Your Organization Utilizing Software from the Cloud?

Is Your Organization Utilizing Software from the Cloud?

All businesses require at least some type of software in order to perform as expected. It’s how organizations acquire this software that has a considerable impact on cost. For some, software can be a budget-breaking nightmare, but others have found a much more convenient way of acquiring this software: as a service.

Continue reading
0 Comments

Why Hasn’t Mobile Payment Really Taken Off?

Why Hasn’t Mobile Payment Really Taken Off?

Digital payment options have become commonplace in today’s society. In fact, ever since people could purchase goods and services off of the Internet, some of the world’s most successful companies are a result of digital payment. It was a natural progression then, as the mobile device boom came, that mobile payment would take the place of cash and/or cards and bring these digital payment options beyond the Internet, and into our retail stores. This simply hasn’t happened and here are four reasons why.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Black Market Social Networking Wearable Technology Office 365 Consultation SharePoint Consumers Network Security Managed IT services Google Maps Malware Mobile Data Small Business Conferencing IBM Analyitcs Business Management High-Speed Internet Digital Marketing IT Services Managed Services Provider Wireless Information Backups Cables Cryptocurrency Vulnerability Printing Apps Remote Monitoring Sync Managed Service Provider Identity Mobile Computing Sports Theft Innovation Virus Smartphone Private Cloud Tech Term YouTube Windows Dark Data Collaboration Access Control Virtual Reality Content Filtering Unified Threat Management Human Error Software Mirgation Mail Merge Budget Development Smartphones Social Media Undo Electronic Health Records Laptop Business Owner Work/Life Balance MSP Mobility Wireless Technology Internet of Things Encryption Microsoft Legal Intranet Emoji Finance Smart Technology Websites Settings Cookies Statistics Piracy Mobile Device Management Mobile Devices Antivirus Saving Time Data Management Google Calendar Web Server Bookmarks Machine Learning Electronic Medical Records Solid State Drive Save Time Disaster Resistance Social Engineering Hacks Database Network Hotspot IT solutions Customer Relationship Management Infrastructure Bring Your Own Device Fleet Tracking Microsoft Excel Financial Server Virtualization Smart Tech Hardware Uninterrupted Power Supply Monitoring Alerts Recycling Identities WiFi Efficiency Bluetooth Passwords Public Speaking Troubleshooting User Operations Project Management Scary Stories Mobile Device Managment Assessment Hackers Motion Sickness Cyber Monday Computing Infrastructure Google Wallet IT Support Wasting Time Utility Computing Botnet Data Security Relocation Phishing Data Recovery Robot Comparison Tech Support Hard Drive Vulnerabilities BDR Productivity Wi-Fi Managed IT Service Upgrades Error Alt Codes Network Management Managed Service Avoiding Downtime Business Outsourced IT Google Computing Test Tracking Blockchain Cybercrime Windows 10 Spyware Read Only Spam Black Friday Vendor Management Computer Care Risk Management Drones Chatbots Unified Communications Politics Staffing Current Events Communication Specifications Data Breach Redundancy Customer Service Competition Network Congestion Apple Education Enterprise Resource Planning Telephony Bandwidth CCTV Patch Management Business Continuity Corporate Profile WPA3 Security Heating/Cooling Android Security Cameras Remote Monitoring and Management PDF Voice over Internet Protocol Permissions Company Culture Deep Learning Licensing Gmail Data Warehousing Cloud E-Commerce Going Green Authentication Downloads Health Superfish Analytics Hard Disk Drive ROI Refrigeration Computer Firewall Administration Facebook Windows 10 Legislation Cybersecurity Notes Knowledge 3D Printing Google Drive Distributed Denial of Service Procurement Automobile Tablet HIPAA Holiday Tech Terms Quick Tips Application VoIP Virtual Private Network Identity Theft Typing Government Technology Tips Hard Drives Hosted Solutions Word Regulations Documents Shortcut Browser Hosted Solution Physical Security Lenovo Bitcoin Screen Reader Privacy Cortana Notifications Printer Maintenance Travel Business Intelligence Crowdsourcing Operating System VPN Automation Employee-Employer Relationship Gadgets Display Recovery Information Technology LiFi Webcam Search Tip of the Week Asset Tracking Mobile Retail Backup Migration Halloween Upgrade Break Fix Chromebook GPS Star Wars Router Ransomware Augmented Reality Taxes How To Motherboard Digital Signature Supercomputer Update Data loss CIO Healthcare Mobile Device IT Technicians Management Users Internet Exlporer Proactive Address RMM Scam Windows 8 Cloud Computing Favorites Modem Social Mouse Google Docs Saving Money The Internet of Things Meetings Mobile Security File Sharing Dark Web USB Disaster Recovery Language Remote Worker Office Processors Remote Computing Telephone Systems Remote Workers Domains VoIP Computer Repair Wires Hacker Tip of the week Technology Alert Samsung Point of Sale Co-managed IT Managed IT Services Digital Payment Employer-Employee Relationship Office Tips Windows 7 SaaS Consulting How To Miscellaneous communications Business Growth Microsoft Office Nanotechnology Virtual Assistant BYOD Administrator Cost Management Techology Document Management 5G iPhone Touchscreen Environment Writing Data Buisness Gadget Software Tips Hacking Proactive IT Running Cable Unsupported Software Law Enforcement Cameras Business Technology Cyberattacks Artificial Intelligence Servers Technology Laws Email IT Management User Error Cooperation Entrepreneur Applications Lithium-ion Battery WannaCry Enterprise Content Management Unified Threat Management Hiring/Firing Authorization IP Address Cabling Time Management IT Consultant Downtime Best Practice Monitors App Trending Permission eWaste History Training Twitter Professional Services Net Neutrality Save Money Computers Storage Data Backup IT service Compliance Flexibility Software as a Service Money Password IT Support OneNote Files Mobile Office Paperless Office Data storage Two-factor Authentication Personal Information IT Budget Website Public Cloud IoT Server Management Business Computing Multi-Factor Security Backup and Disaster Recovery Firefox Cache End of Support Help Desk Zero-Day Threat User Tips Internet Managed IT Virtual Desktop Connectivity Fraud Networking Humor Outlook Cleaning Chrome Features Productivity Safety Experience G Suite Best Practices Programming Fun IT Consulting Geography Staff Employees Big Data Instant Messaging Phone System Disaster Workplace Tips PowerPoint Presentation Managing Stress

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code