Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Prefer Your Reality Augmented, or Virtual?

Do You Prefer Your Reality Augmented, or Virtual?

At the International Consumer Electronics Show (CES), new products (and the technologies that fuel those products) are put on display to give industry professionals a look to see what companies are working on. At CES 2018, held in Las Vegas, Band and Olufsen introduced their speakers-as-art-concept, Samsung unveiled a 146” television that is designed to take up a wall, and many companies, including Aura, introduced new smart home security products that are sure to get an intruder’s attention (over Wi-Fi).

Continue reading
0 Comments

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Data Security Technology Laws Cryptocurrency Smartphone IoT Upgrade Cabling iPhone Google Docs Managed Services Provider Virtual Desktop Humor Apps Encryption Internet of Things User Tips Collaboration Wires Telephony Health LiFi Uninterrupted Power Supply Sports Downtime Taxes Scam Business Computing Server Test How To Statistics Superfish Miscellaneous Co-managed IT Mobile Security Compliance Business Technology Staffing Websites Shortcut Printing Touchscreen Buisness Budget Network Congestion WiFi PDF Mobile Device Computing Infrastructure Mobile Devices Downloads Artificial Intelligence Meetings PowerPoint Managed IT services Productivity Windows Software as a Service Cloud Computing High-Speed Internet Recycling Legislation Mobile Device Managment Smartphones Screen Reader IT Support Monitors Outsourced IT Redundancy Operating System Modem Search Network Security Hackers Public Speaking Solid State Drive Outlook Bluetooth Save Time Error Security Cameras Android Trending Office Human Error Bring Your Own Device Bookmarks Chromebook Law Enforcement Motion Sickness Sync Cables IT Consultant Computers Nanotechnology Word Electronic Health Records Employees Company Culture Computer Public Cloud Blockchain IT Management Identity Ransomware Tech Support Management App Tech Term Cyber Monday Mobile Data Recovery Business Intelligence Geography Point of Sale Data Management Drones Net Neutrality Unified Threat Management Digital Payment Operations Employee-Employer Relationship Internet Cybersecurity Assessment Read Only Experience Migration Automation Apple Cortana IBM Business Management IP Address Distributed Denial of Service Documents Laptop Comparison Efficiency Undo Files Mirgation Hard Disk Drive Knowledge Big Data Tech Terms Website Deep Learning Wi-Fi Social Social Media Training Environment Multi-Factor Security Technology Tips Networking G Suite Managed IT Service Remote Monitoring and Management Workplace Tips Holiday OneNote Scary Stories Mobile Office Backups Programming Employer-Employee Relationship Google Staff Licensing Risk Management Electronic Medical Records Network Management YouTube Webcam Fraud Business Owner History Education Flexibility Cleaning Computer Care Best Practices Disaster Recovery Features Samsung Display WPA3 Regulations Maintenance E-Commerce Chatbots Mobility Retail Consumers Router Tip of the Week Address Data storage Cost Management Data VoIP Cooperation 5G Halloween Printer Virtual Private Network Phone System Telephone Systems Refrigeration Botnet Cyberattacks Mail Merge Passwords The Internet of Things Zero-Day Threat Presentation VPN Vulnerabilities Supercomputer Heating/Cooling Managed IT Services 3D Printing Hardware Procurement IT Consulting Domains Computer Repair Hosted Solution Disaster Resistance Politics Financial Business Growth Server Management Crowdsourcing Web Server Time Management Identities Piracy Asset Tracking Data Warehousing Spam Chrome Network Avoiding Downtime Black Friday Virtual Reality Consultation Automobile Wireless Technology Theft Hacks IT solutions Fun Administration Disaster User Error Remote Monitoring Saving Time Backup and Disaster Recovery Software Tips Mobile Computing Lithium-ion Battery Black Market Productivity Browser Identity Theft Money Business Conferencing Office 365 End of Support IT Budget Users communications Malware Tablet BYOD Infrastructure Unsupported Software Permission Permissions Smart Technology Corporate Profile Data loss HIPAA Unified Communications Current Events Patch Management Instant Messaging Troubleshooting Microsoft CCTV Healthcare Vulnerability Application Data Recovery Alt Codes Hard Drive Innovation Tracking Machine Learning SaaS Smart Tech Digital Microsoft Office Settings Connectivity Remote Computing Entrepreneur Cache Saving Money RMM Hosted Solutions Gadgets Backup CIO User Processors Alerts USB Running Cable Hiring/Firing Physical Security Cameras Hard Drives WannaCry Email Data Breach Virus Proactive Alert Finance IT Technicians Customer Service Quick Tips Social Engineering Content Filtering Managed IT IT Support Legal Government Paperless Office eWaste Favorites Google Wallet Storage IT service Data Backup Spyware Windows 10 SharePoint BDR Business Continuity Two-factor Authentication Vendor Management Upgrades Google Drive Best Practice Help Desk Office Tips Analytics Managed Service Provider Development Cybercrime Technology Password Fleet Tracking Intranet Personal Information Typing Authentication Wireless ROI VoIP Language Firewall Break Fix Phishing IT Services Update Dark Data Mobile Communication Private Cloud Managing Stress Digital Signature Virtualization Enterprise Resource Planning Small Business Managed Service Hacking Cookies Software Enterprise Content Management Monitoring Bandwidth File Sharing Consulting Emoji Marketing Hotspot Remote Worker Specifications Microsoft Excel Servers Twitter Facebook Google Maps Gmail Google Calendar Safety Remote Workers Cloud Antivirus Customer Relationship Management Work/Life Balance Utility Computing Unified Threat Management Notifications Windows 10 Information How To Firefox Wearable Technology Bitcoin Windows 8 Competition Gadget Privacy Security Mobile Device Management Robot Dark Web Proactive IT Access Control Techology Tip of the week Administrator Save Money Authorization Going Green Project Management Information Technology Mouse Social Networking Internet Exlporer Travel Analyitcs Hacker Computing MSP Relocation Document Management Lenovo Applications Motherboard Star Wars Augmented Reality Writing GPS

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code