Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Prefer Your Reality Augmented, or Virtual?

Do You Prefer Your Reality Augmented, or Virtual?

At the International Consumer Electronics Show (CES), new products (and the technologies that fuel those products) are put on display to give industry professionals a look to see what companies are working on. At CES 2018, held in Las Vegas, Band and Olufsen introduced their speakers-as-art-concept, Samsung unveiled a 146” television that is designed to take up a wall, and many companies, including Aura, introduced new smart home security products that are sure to get an intruder’s attention (over Wi-Fi).

Continue reading

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Hackers Spyware Maintenance Competition Cleaning Virtual Private Network Mobile Device Statistics Authorization Vulnerabilities Travel Server Management Cabling Mirgation Data Warehousing Technology Laws Typing Alerts Sync Mobile Cryptocurrency Entrepreneur Smart Tech IT Consultant Phishing Unified Threat Management Social Engineering Router App Printer Database Automobile Wasting Time Supercomputer Data storage Chromebook ROI Windows 7 Black Friday Distributed Denial of Service Customer Service Net Neutrality Website Tech Terms Sports Cost Management VoIP Saving Time G Suite Remote Computing File Sharing Computer Care Digital Signature Printing Gadgets Networking eWaste Application Conferencing Healthcare IT Consulting Private Cloud Outsourced IT Scam CIO Modem Comparison RMM Running Cable Analyitcs Small Business Read Only Bitcoin Going Green IT solutions Halloween MSP Regulations Health YouTube Technology Tips Upgrade Training Relocation IT Support Bluetooth Asset Tracking Remote Monitoring Point of Sale IP Address Mobile Computing Business Technology Backups Human Error Managed IT Services Bring Your Own Device Piracy Tablet IT Services Retail Internet Exlporer Quick Tips Public Cloud Firewall Software as a Service VoIP Tech Term Microsoft Excel Lenovo Virtual Desktop Office 365 Drones Social Media Employer-Employee Relationship Update Google Maps Telephone Systems Procurement Physical Security Geography Chrome OneNote Politics Bandwidth Computing IoT Error Mail Merge Consultation Internet Web Server Legislation Help Desk Customer Relationship Management Remote Worker WannaCry Meetings Identity Mobile Security Fun Information Technology Intranet Miscellaneous Motherboard Servers Management BDR Downloads Current Events Security Holiday Business Collaboration Wireless Samsung Scary Stories Wireless Technology Phone System Connectivity Downtime History E-Commerce Saving Money Computers Cache Smartphones Staffing Laptop Computing Infrastructure Save Money Specifications Mobile Devices Refrigeration Data Backup SharePoint Apple Office Tips Writing Storage IT service Applications Two-factor Authentication Solid State Drive User Humor Mobile Data Hardware Presentation Company Culture Cameras Instant Messaging Uninterrupted Power Supply Wearable Technology Network Security Managed Service Mobility Communication Computer Repair Best Practices Cloud Monitors Shortcut Electronic Medical Records Malware Windows 8 Websites Users Hosted Solutions Business Intelligence Authentication Virtual Assistant Buisness Cyber Monday Analytics Disaster Resistance GPS Content Filtering Digital Managing Stress Data Management Backup Network Congestion Technology Hard Disk Drive Migration Patch Management Computer Windows 10 Risk Management CCTV Alt Codes Password Big Data Tip of the Week Efficiency Compliance Taxes Enterprise Content Management Staff Virus Administrator Break Fix Nanotechnology Information Chatbots Unified Threat Management Automation Smartphone SaaS Star Wars Notes Mobile Device Managment Knowledge Enterprise Resource Planning Screen Reader Co-managed IT Business Growth Multi-Factor Security Permissions Experience Notifications Cortana Artificial Intelligence Hacks Business Computing Project Management Voice over Internet Protocol Server Digital Payment IT Support Infrastructure Security Cameras Features Assessment Windows Flexibility Theft Trending HIPAA Employee-Employer Relationship communications Google Augmented Reality Tech Support Webcam Bookmarks Social Social Networking User Tips Avoiding Downtime Settings Proactive Language Managed IT Service Programming LiFi Blockchain Disaster Network Management Unsupported Software Business Continuity Touchscreen Time Management Virtualization Microsoft Fraud High-Speed Internet Workplace Tips Money Botnet Undo Personal Information Best Practice IT Management Identities Google Wallet iPhone Cables Software Tips Office Deep Learning Google Docs Data Development Domains Data Breach Internet of Things Smart Technology User Error Software PDF Corporate Profile Licensing Law Enforcement Operating System Professional Services Google Calendar Paperless Office Privacy Troubleshooting Cybersecurity Twitter Proactive IT Cybercrime Crowdsourcing Dark Data Innovation Telephony The Internet of Things Ransomware Microsoft Office Save Time Operations Productivity Techology Tip of the week Hosted Solution Financial 3D Printing Processors Lithium-ion Battery Gmail Identity Theft Upgrades Finance Managed IT services Superfish Environment Favorites Documents IT Budget Hotspot Business Management Monitoring Hacker Administration Mouse Utility Computing Business Owner Access Control Unified Communications Cloud Computing Permission Wi-Fi Zero-Day Threat Google Drive Electronic Health Records Machine Learning Remote Monitoring and Management Backup and Disaster Recovery Robot Motion Sickness Legal Safety USB Windows 10 Browser Heating/Cooling 5G WPA3 VPN IBM Education End of Support Word Files Cooperation Display Remote Workers Hiring/Firing Gadget Recycling Virtual Reality Apps Public Speaking Document Management Email Marketing Cookies Tracking Mobile Device Management Dark Web Alert Work/Life Balance Antivirus Data Recovery Vulnerability Mobile Office Recovery Government Test Address WiFi Hard Drive Consumers Data Security Consulting Budget Vendor Management Emoji Encryption Employees Data loss Managed IT Facebook Spam Disaster Recovery How To How To PowerPoint IT Technicians Black Market Redundancy Passwords Managed Service Provider Hard Drives Managed Services Provider Fleet Tracking BYOD Search Android Firefox Network Wires Productivity Outlook Hacking Cyberattacks

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...