Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Get Rid of Those Pesky Extra Cables

How To Get Rid of Those Pesky Extra Cables

Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuffed in a junk drawer or in a random box that they’ve kept “just in case.” Every home or business has the same scenario going on: lots of wires and cables left over from all the e-waste they have discarded over the years. If you want to get rid of your unwanted cables, here are a couple of tips on how to do so properly.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Managed IT Service Computing IT Services Ransomware Disaster Recovery Electronic Health Records Saving Money PDF Holiday Computer Care Employer-Employee Relationship IT Consulting Hosted Solutions Marketing Google Docs Nanotechnology Shortcut Travel Bandwidth Analyitcs Instant Messaging Relocation Chromebook Knowledge Point of Sale Staff Application Data Undo Mobile Device Managment Gmail Proactive Downtime Authentication Electronic Medical Records Alert CIO Presentation VoIP Remote Worker E-Commerce Malware YouTube Mobility Chatbots Meetings G Suite Managing Stress Training Black Friday Money WPA3 Piracy Microsoft Office Trending App Government Asset Tracking Laptop Windows 10 Tech Support Notifications SharePoint Cortana Mobile Device Computer Firewall Unsupported Software Safety Tracking Windows Virus Office Multi-Factor Security Consulting Operations IT Support Distributed Denial of Service Error Data Security Efficiency CCTV Monitoring Mobile Device Management VPN Sports Microsoft Cables Enterprise Content Management Employees Mobile Unified Threat Management Paperless Office Disaster Resistance Permissions Managed IT services Virtualization Computers Dark Data Website Motherboard 3D Printing Data Backup Humor VoIP Risk Management Work/Life Balance IT Support Dark Web Redundancy Augmented Reality User Managed IT Services Cost Management Unified Threat Management Current Events Hackers Cleaning Hotspot Scary Stories Proactive IT OneNote Virtual Private Network Hiring/Firing Social Smart Technology Hacking Licensing Samsung Network Security Hosted Solution Windows 8 Downloads Authorization Save Time Data loss Legal Business Webcam Best Practices Touchscreen Backup Servers Files eWaste Productivity Co-managed IT How To Social Networking Access Control Superfish Tip of the week Twitter Patch Management Tech Terms Web Server Users Information Consumers Alerts communications Processors Two-factor Authentication Enterprise Resource Planning Wearable Technology Help Desk Personal Information Recycling Education Sync IT Budget Network Management Browser High-Speed Internet IT Technicians Maintenance HIPAA Backup and Disaster Recovery Firefox Update Technology Tips Storage Wireless Microsoft Excel GPS Disaster Digital Communication Business Management Procurement Data storage Mobile Security Google Scam Display Data Management Alt Codes ROI Remote Computing WannaCry Computing Infrastructure Phone System The Internet of Things Encryption Search Apps Specifications How To Identity Uninterrupted Power Supply Cameras Outsourced IT WiFi Assessment Cyberattacks Tablet Botnet Office 365 Entrepreneur Staffing History Business Computing Robot Virtual Desktop Business Growth Upgrades Printing Test Consultation Managed IT User Error Documents Security Cameras Law Enforcement Language SaaS Company Culture Social Engineering Drones Lenovo Outlook Privacy Collaboration Finance Spyware IT solutions Server Management Identities Remote Monitoring Smart Tech Techology BYOD Wi-Fi Compliance Halloween Email Deep Learning Gadgets IT Consultant Address Mobile Devices IoT Solid State Drive Best Practice Save Money Saving Time Emoji Infrastructure Going Green Technology Data Recovery Human Error Politics Public Speaking Cloud Computing Motion Sickness Mirgation Hard Disk Drive Corporate Profile Conferencing Troubleshooting Big Data Technology Laws Vulnerabilities Small Business Regulations Vulnerability Typing Automation Business Technology Mobile Office Experience Cybercrime End of Support Bluetooth Taxes Public Cloud Cryptocurrency Content Filtering Writing Printer Hacker Development Features Healthcare Websites Software Tips Document Management Blockchain Project Management Time Management Business Owner User Tips Running Cable Screen Reader Mobile Computing Passwords Identity Theft Software Migration Vendor Management Tech Term Analytics Permission Supercomputer Hard Drives Antivirus IT Management Upgrade Wires Physical Security Read Only Bitcoin PowerPoint Google Wallet Smartphone Star Wars Theft Private Cloud Utility Computing Wireless Technology IT service IBM Cabling Cybersecurity Customer Service Facebook Cooperation Comparison Connectivity Administration Geography Google Calendar Intranet Avoiding Downtime Favorites Information Technology Remote Workers Competition Google Drive Fleet Tracking Android Digital Payment Mail Merge Quick Tips Customer Relationship Management Monitors Recovery Gadget Phishing Smartphones Settings Workplace Tips Router Net Neutrality Data Warehousing MSP BDR Management Cloud Cache Administrator Data Breach Network Machine Learning Legislation Google Maps Internet Exlporer Computer Repair Remote Monitoring and Management Zero-Day Threat Business Continuity USB Managed Service Networking Password iPhone Unified Communications Innovation Break Fix Internet of Things Fun Business Intelligence Social Media LiFi Telephone Systems Chrome Managed Services Provider Office Tips Domains Managed Service Provider Hacks Word Windows 10 Tip of the Week RMM Applications Fraud Refrigeration Flexibility 5G Bookmarks Backups Virtual Reality Automobile Mobile Data Artificial Intelligence Miscellaneous Apple Lithium-ion Battery Cookies Productivity Telephony Mouse Software as a Service Buisness Hardware File Sharing Cyber Monday Health Black Market Modem Hard Drive Environment Financial Statistics Server Digital Signature Programming Security IP Address Network Congestion Bring Your Own Device Internet Operating System Employee-Employer Relationship Heating/Cooling Crowdsourcing Spam Budget Retail

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...