Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Get Rid of Those Pesky Extra Cables

How To Get Rid of Those Pesky Extra Cables

Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuffed in a junk drawer or in a random box that they’ve kept “just in case.” Every home or business has the same scenario going on: lots of wires and cables left over from all the e-waste they have discarded over the years. If you want to get rid of your unwanted cables, here are a couple of tips on how to do so properly.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Presentation Fraud Data Backup Best Practices Motion Sickness IT solutions Applications Spyware Documents Application Bluetooth Emoji Instant Messaging Word Settings Windows 10 LiFi Cache Cyber Monday Going Green IT Support Small Business Marketing Router Licensing Collaboration Dark Data Sync Windows 8 Data Warehousing IT Consulting Identities Government Procurement RMM Intranet Business Microsoft Office Development Analytics Microsoft Training Information Proactive How To Tip of the week Consulting Remote Computing Read Only End of Support Tablet Address Budget Saving Time Patch Management Antivirus Gadget Assessment Wi-Fi Innovation Users Business Growth Motherboard Twitter Information Technology Hosted Solution Consumers Backup Software as a Service Lenovo VoIP Business Computing Ransomware Employee-Employer Relationship Communication Cleaning Network Security Current Events Typing VoIP User Error Unsupported Software Cameras Electronic Health Records Phone System Document Management VPN Staffing Bitcoin Search Financial Avoiding Downtime Business Owner Electronic Medical Records Work/Life Balance Network Congestion Cybercrime Authentication USB Remote Monitoring and Management Enterprise Content Management Business Intelligence Gadgets Distributed Denial of Service CIO Apple Break Fix WPA3 IT Consultant Cables Firefox Encryption Tip of the Week Help Desk Cryptocurrency iPhone Artificial Intelligence Processors Upgrades Data Computer Care PDF Bring Your Own Device Fun Productivity Two-factor Authentication Facebook Augmented Reality Notes BDR Spam Legislation Modem Touchscreen Hard Disk Drive Mobile Office Wires Professional Services The Internet of Things Regulations Managing Stress Computing Managed Service Consultation Public Speaking Management Drones Migration Competition Storage Vendor Management Connectivity Managed Service Provider Hard Drives Access Control Taxes Webcam Wireless 5G Physical Security Workplace Tips Scam Gmail Trending Passwords Asset Tracking Business Continuity Maintenance Paperless Office Mobile Data Proactive IT Conferencing Personal Information Data Management Hacking Software Tips Administrator Permission Technology Data Recovery Internet of Things Customer Service Virtualization Infrastructure Domains Law Enforcement Redundancy Google Calendar Remote Workers Efficiency Comparison Supercomputer Scary Stories Social Networking Permissions Outsourced IT Travel Managed IT Services Monitoring Save Time Troubleshooting Digital Mobility Smartphones eWaste 3D Printing Email IT Support Features Servers Data Security Experience Private Cloud Quick Tips Web Server Botnet Computer Smartphone Downtime Screen Reader Safety Hard Drive Statistics Phishing User Browser Technology Laws Uninterrupted Power Supply Operations Blockchain Machine Learning Disaster Recovery Environment WiFi Relocation Identity Cyberattacks IT Management Recycling Customer Relationship Management Google Wallet Mobile Devices Analyitcs IT Technicians Unified Threat Management Tech Term Computer Repair How To Office Tips Firewall Bandwidth Mail Merge Project Management Money Computers Chromebook Big Data IT Services Windows Voice over Internet Protocol Update Content Filtering Smart Technology Computing Infrastructure Staff Black Friday Security Android Hosted Solutions Mobile Device Upgrade Backup and Disaster Recovery Retail Internet Lithium-ion Battery Black Market Automobile MSP Favorites Dark Web Cooperation IP Address ROI Data storage Social Media Healthcare HIPAA Bookmarks Mobile Device Management Google Docs Heating/Cooling Vulnerability Remote Worker Windows 7 Robot Point of Sale Unified Communications IoT Star Wars communications Specifications Google Mobile Finance Unified Threat Management Mobile Security Operating System Company Culture Data Breach Geography Networking Social Engineering Programming Outlook Crowdsourcing Printing Nanotechnology Microsoft Excel YouTube Legal Virtual Assistant Best Practice Telephony Tracking Co-managed IT Digital Payment G Suite Database History Backups Cybersecurity Managed IT services Solid State Drive Recovery Education Identity Theft Mobile Device Managment Knowledge Wearable Technology Fleet Tracking Laptop CCTV Websites Password Managed IT Disaster Refrigeration Samsung Employees Hacks Network Management Multi-Factor Security Buisness Cookies App Net Neutrality Digital Signature Piracy Mirgation Vulnerabilities Halloween E-Commerce Google Drive Office Virtual Reality Server Management Time Management Office 365 Chatbots Miscellaneous Writing Chrome IT service Test PowerPoint Internet Exlporer SharePoint Humor Software SaaS Data loss Save Money Saving Money Tech Support Zero-Day Threat Alert Cortana Hotspot Cabling Privacy Malware Downloads Mouse Google Maps Compliance GPS Employer-Employee Relationship Public Cloud Managed IT Service Productivity Superfish Holiday Enterprise Resource Planning Alerts Undo Notifications Virtual Desktop Meetings Apps Printer BYOD Remote Monitoring Entrepreneur WannaCry Technology Tips Smart Tech Monitors Virus Wireless Technology Managed Services Provider Cost Management IT Budget Hiring/Firing Business Technology Deep Learning Sports Security Cameras Disaster Resistance Wasting Time Server Risk Management Error Website Hackers Business Management Windows 10 Alt Codes Utility Computing Flexibility Network Cloud Computing File Sharing Social OneNote Running Cable Hacker High-Speed Internet IBM Cloud Files Health Mobile Computing Language Corporate Profile Telephone Systems Tech Terms Shortcut Authorization Techology Human Error Theft Automation Hardware User Tips Politics Administration Display Virtual Private Network

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code