Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Has Played a Part in Shaping How We Celebrate the Season

Technology Has Played a Part in Shaping How We Celebrate the Season

The holiday season has always been one of deep-seated traditions, some that draw from ancient customs, and some that are inspired by more contemporary trends. These traditions have been shaped, and often inspired by, the technology available in the day. Today, we’ll reflect on how the technologies we have now have impacted our celebratory traditions.

Continue reading
0 Comments

Boost Productivity With These 3 Automation Apps

Boost Productivity With These 3 Automation Apps

Today’s fast-paced work environment demands multitasking and juggling various projects at once. Thankfully, there’s a lot of great technologies designed to make workloads more manageable. If you’ve not yet looked into utilizing automation apps for your business, you may be surprised to learn how they can improve efficiency.

Continue reading
0 Comments

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

b2ap3_thumbnail_ai_author_400.jpgEven if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

Tip of the Week: How to Automatically Reboot Your PC

b2ap3_thumbnail_reboot_automation_400.jpgIf you were asked to recall the last time you restarted your PC or smartphone, could you? Too many people don’t take the few minutes required to promote quality efficiency and productivity with their machines. In fact, rebooting can be very much like a full night’s sleep for a computer, and without it, its performance might not meet your business’s expectations.

Continue reading
0 Comments

How Long Until Automation Takes Away Existing Jobs?

b2ap3_thumbnail_will_automation_userp_human_workers_400.jpgAutomation is an increasingly sought-after convenience in the workplace, especially when it comes to repetitive tasks. Some professionals foresee a world which has fully automated assembly lines, but most are only concerned about what this can do for their assets. Instead of freeing up menial positions for others to take on more meaningful existences, could automation destroy these jobs completely?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Deep Learning Computers Supercomputer BYOD MSP Operating System Software Tips Data Warehousing 3D Printing Cleaning Hackers Hacker Websites Productivity Vulnerabilities Permission Networking Efficiency Vendor Management Compliance Cache Gmail Health Business Owner Electronic Health Records Paperless Office Email Enterprise Resource Planning Microsoft Data storage Finance Wi-Fi Remote Worker IT Consultant Tech Terms Web Server Document Management User Tips Saving Money Mobile Device Management Lithium-ion Battery Network Management Managed IT Sports Dark Web SharePoint Data loss Business Management Geography Running Cable Alt Codes Enterprise Content Management Google Drive Staffing Mouse Backups Multi-Factor Security Spyware Motion Sickness CCTV Software Employer-Employee Relationship Windows 10 Business eWaste Entrepreneur Remote Monitoring Disaster Resistance Antivirus Windows Bookmarks Legal Programming Two-factor Authentication Remote Workers The Internet of Things Managed Service Documents Google Maps SaaS Staff Social Media Security Cameras Proactive Consultation Identity BDR Telephony Comparison Webcam Software as a Service Analytics Address Social Administrator Taxes Personal Information Business Technology Microsoft Excel Statistics Microsoft Office Cost Management Backup Travel Computer Care Test VoIP Administration Relocation Upgrade Regulations Encryption Office Black Market Computer ROI Private Cloud Office 365 Mobile Devices Unified Threat Management Network Licensing Help Desk Managed IT Service Going Green Competition IP Address Writing Managed IT Services Applications Redundancy Cryptocurrency Read Only WiFi Solid State Drive Printer Website Cybercrime Trending Hard Drive Google Wallet Lenovo Development Hard Disk Drive Smart Technology Phishing Information Technology How To Collaboration Meetings Gadget Digital Signature Outsourced IT Flexibility PowerPoint Law Enforcement Experience Cables Disaster Recovery Company Culture Automation High-Speed Internet Hotspot Virtualization Education Hacks Outlook Infrastructure Public Cloud Android Tip of the week Bring Your Own Device Specifications Files Utility Computing Internet of Things Cyberattacks Data Backup Halloween Employees Chrome Managed Services Provider File Sharing Router Management Chromebook Wires Communication Politics Instant Messaging Monitors Touchscreen Internet Exlporer Mobile Computing Social Networking Best Practices Data Management Computing Infrastructure Dark Data Password VoIP Maintenance Laptop Google Docs G Suite Cloud Computing Risk Management IT Budget Virtual Desktop Vulnerability Holiday Wearable Technology Intranet Downloads Uninterrupted Power Supply Remote Computing Knowledge User Error OneNote Downtime Hacking Alert Tech Support Mobile Security Notifications Innovation E-Commerce Hard Drives HIPAA Twitter Operations Time Management Mobile Device Managment Storage Black Friday Processors Refrigeration User Cortana Fun Google PDF Net Neutrality Productivity Save Time Mail Merge Fleet Tracking Mobile Zero-Day Threat Marketing Modem Procurement Spam Big Data Unified Threat Management Customer Service Automobile Analyitcs Windows 10 Motherboard Hardware Sync Save Money Miscellaneous Security Money Legislation Smart Tech Machine Learning Office Tips Digital Internet Buisness Managing Stress Cabling Conferencing Application Recovery Tip of the Week Data Recovery Scam Techology Physical Security 5G Bluetooth IT Management Malware Cloud Heating/Cooling Cyber Monday Break Fix Servers History Digital Payment Facebook Technology Augmented Reality Alerts Monitoring Settings Permissions Smartphones Identities Managed IT services IT Support Network Congestion Apple Word Access Control Consulting Cooperation Quick Tips Current Events Wireless Technology RMM How To Remote Monitoring and Management communications Healthcare Cookies Hosted Solutions Point of Sale Human Error IoT Cameras Assessment Privacy Apps Superfish Computer Repair Environment IBM Mobile Office Telephone Systems Distributed Denial of Service Migration Mirgation Presentation Favorites Firewall Upgrades Bitcoin Co-managed IT Backup and Disaster Recovery Tablet Troubleshooting Managed Service Provider Recycling Hosted Solution Safety IT service Business Growth CIO Gadgets Humor Corporate Profile Consumers Passwords Technology Laws Saving Time Business Intelligence Server WPA3 Small Business Search Browser Drones Phone System Mobile Data Business Continuity Botnet IT Technicians Government Ransomware iPhone Star Wars Robot Blockchain Unified Communications Authentication Virtual Private Network GPS Typing Content Filtering Technology Tips Virtual Reality Crowdsourcing Features Avoiding Downtime Patch Management IT Consulting Language Users Public Speaking Error Windows 8 Mobile Device Hiring/Firing Data Budget Proactive IT Disaster LiFi Work/Life Balance Theft Server Management Mobility IT solutions Connectivity WannaCry App Computing Printing Training VPN Business Computing Tracking Employee-Employer Relationship Smartphone Electronic Medical Records IT Services Authorization Information Unsupported Software Display Undo Update Piracy Social Engineering YouTube Financial Best Practice Google Calendar IT Support Emoji USB Firefox End of Support Customer Relationship Management Nanotechnology Identity Theft Data Breach Network Security Data Security Retail Artificial Intelligence Shortcut Samsung Cybersecurity Wireless Screen Reader Project Management Tech Term Chatbots Scary Stories Fraud Domains Bandwidth Workplace Tips Virus Asset Tracking

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code