Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What’s Your Competition Up to? Use these 6 Apps to Find Out!

b2ap3_thumbnail_track_your_competitors_400.jpgAs a business owner, you might have the sudden and inexplicable urge to creep on (track) your competitors to get a feel for their prices and services. With these six apps, you can make this job a little bit easier by seeing what others have to say about your competitors, including what they are saying about you.

Continue reading

Tip of the Week: 5 Ways to Be Better Than Your Competition

b2ap3_thumbnail_win_against_your_competition_400.jpgEvery business has competition at some level. It’s tempting to ignore your competition (it may even be hard to speak their name), but there’s great value that comes with watching them closely; namely, you can learn from what they do in order to improve upon your own product or service.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Social Networking Google Maps Deep Learning Innovation User Tips Apple Uninterrupted Power Supply Distributed Denial of Service Writing Help Desk Holiday Analytics ROI Sync Display IT Services Cache VoIP Legislation Scary Stories Troubleshooting Document Management Co-managed IT Social Media RMM Features Software as a Service Users MSP Network Management Application Consultation Comparison Entrepreneur Smart Technology Consumers Fraud Update Telephone Systems Cortana Data Breach Identities Disaster Resistance VoIP Monitors Refrigeration Best Practices Time Management Internet Exlporer Fleet Tracking Operating System Virtual Desktop End of Support Server Bandwidth Mobile Device Management Tracking Electronic Medical Records Google Calendar Business Intelligence Wi-Fi IP Address Patch Management Break Fix Managed IT Content Filtering Firewall Blockchain Remote Worker The Internet of Things BYOD Websites Marketing Intranet Gadgets Notifications Big Data Going Green Data Alerts Gmail Financial How To Presentation Website Tech Terms Software Tips Smart Tech Nanotechnology PDF Net Neutrality Trending G Suite Black Market Sports Mobile Computer Malware Motherboard Hard Drive Bluetooth Emoji WannaCry Solid State Drive Information Technology Wearable Technology IT Consultant communications Phishing Two-factor Authentication Mobile Devices Vendor Management Chrome CCTV Theft Server Management Efficiency Google Wallet Paperless Office Corporate Profile USB Computer Care Disaster Hotspot Information Outlook Connectivity Statistics Hiring/Firing Regulations Business Bitcoin Microsoft WPA3 Mobile Device Managment eWaste Domains Wireless Technology Downloads Modem Business Management Tablet Black Friday Outsourced IT High-Speed Internet Unified Threat Management Point of Sale Security Cameras Identity Microsoft Office Current Events Processors BDR Managed IT Services Database Instant Messaging Fun Management Search Remote Monitoring Chromebook Windows 7 Hardware Screen Reader CIO Staffing Technology Laws Cleaning Consulting Unified Threat Management Employees Botnet Retail Office 365 Internet of Things Customer Relationship Management Automation Drones Voice over Internet Protocol Managed Service Provider Wireless 5G Remote Workers Networking Unified Communications Digital Data Management Android Data Security Enterprise Resource Planning Ransomware Authentication Government Star Wars Recovery Assessment Shortcut Smartphones Employee-Employer Relationship Smartphone Safety Remote Computing Mouse Windows HIPAA Access Control Data Backup Law Enforcement Lithium-ion Battery Infrastructure Bookmarks Tech Term User Authorization Data Warehousing Hacker Small Business Mobile Computing Privacy Firefox Managed Services Provider Twitter Money VPN Enterprise Content Management Business Continuity IT Budget Cabling Artificial Intelligence Cloud Windows 10 IT Technicians IT Consulting Finance Network Security Error Virtual Private Network Business Growth Computing Infrastructure Digital Signature Printer Computing Saving Time Upgrade Motion Sickness Environment Best Practice Browser IT Support IBM Tech Support Gadget Quick Tips Mobile Office Backup Meetings Redundancy Tip of the week GPS Dark Data Customer Service Computer Repair Business Technology Cameras Backups Healthcare IoT Virtualization Physical Security Asset Tracking Licensing Proactive IT Cost Management Robot Halloween Router Hard Drives How To Competition Bring Your Own Device SharePoint Tip of the Week Electronic Health Records Mirgation Wasting Time Favorites Google Drive Save Money Notes Cables Buisness Cooperation Passwords Disaster Recovery Social Company Culture Knowledge Migration Taxes Superfish Web Server IT Support Alt Codes Apps Specifications Save Time Automobile Password Word History Hacks Mobile Data Cookies Windows 10 3D Printing Office Tips Administrator Hosted Solutions Crowdsourcing Cryptocurrency Machine Learning Public Speaking User Error Test Touchscreen Downtime Productivity Documents Dark Web Virtual Reality Zero-Day Threat Flexibility Vulnerability Workplace Tips Education Budget Permissions Hackers YouTube Internet Project Management Private Cloud Politics Software Digital Payment Unsupported Software Google Backup and Disaster Recovery Printing Scam IT service Operations IT Management Geography File Sharing Managing Stress Storage Humor OneNote Alert Email IT solutions Employer-Employee Relationship Productivity Samsung Files Business Owner Hosted Solution Servers Office Administration SaaS Wires Travel Windows 8 Collaboration Training Mobile Security Encryption Upgrades Business Computing App Phone System Miscellaneous Recycling Experience Maintenance Facebook Virus Avoiding Downtime Data Recovery Technology Cyber Monday Professional Services Compliance Settings Supercomputer Analyitcs Procurement Applications Managed Service Microsoft Excel Cybercrime Development Webcam Mobile Device E-Commerce Utility Computing Multi-Factor Security Google Docs Proactive Conferencing LiFi Chatbots Permission Health Hacking Network Managed IT services Cyberattacks Read Only Antivirus Language Risk Management Personal Information Piracy Spyware Heating/Cooling Spam Relocation Lenovo Programming Typing Saving Money Address Data storage Remote Monitoring and Management Security Public Cloud Social Engineering Mobility WiFi Communication Cloud Computing Data loss Managed IT Service Work/Life Balance Monitoring Network Congestion iPhone Technology Tips Laptop Computers Vulnerabilities Identity Theft Legal Augmented Reality Staff Human Error Techology Cybersecurity Undo Telephony Running Cable Mail Merge Virtual Assistant PowerPoint Hard Disk Drive

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...