Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Do You Know When It’s Time For an Upgrade?

When Do You Know When It’s Time For an Upgrade?

Nothing lasts forever; this phrase is true regardless of which industry you’re in or business you run. We all use technology in the office to a certain extent, and the ugly truth is that someday that technology will fail. It’s critical that you monitor technology for warning signs prior to its failure so as to avoid costly repair bills and rushed replacements. You might be surprised by how much you save as a result.

Continue reading
0 Comments

Tech Term: Responsive Web Design

Tech Term: Responsive Web Design

We all have our favorite websites to visit, as well as those we often have to visit to fulfill our responsibilities. As a result, it isn’t uncommon for us to try and access the same websites on both a desktop workstation and a mobile device, but some websites work better than others while trying this. This is because of something called responsive web design, which we’ll review below for our weekly Tech Term.

Continue reading
0 Comments

Tip of the Week: How to Speed Up a Windows PC

Tip of the Week: How to Speed Up a Windows PC

The personal computer is a remarkable tool, allowing us to accomplish levels of productivity and efficiency at speeds that were once only dreamed of… at least, that’s how it feels at first. However, it doesn’t take very long for a computer to seem like it drags on and on before performing the task requested of it. Why is that, and how can this be resolved?

Continue reading
0 Comments

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Continue reading
0 Comments

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

Continue reading
0 Comments

Power Off, or Leave It On?

Power Off, or Leave It On?

At the end of the day, do you shut down your computer or do you put it into sleep mode? Depending on what you need from your device the next day, you might want to consider which option benefits you the most. Here are some of the pros and cons of both approaches so that you can pick which one best suits your situation.

Continue reading
0 Comments

Tech Term: Motherboard

Tech Term: Motherboard

A computer is made up of many parts, one of which is today’s Tech Term: the motherboard. We’ll discuss what the motherboard does for your computer and why it’s such an important part for its continued operation.

Continue reading
0 Comments

Tip of the Week: Optimize Your Computer By Taking Care of the Clutter

Tip of the Week: Optimize Your Computer By Taking Care of the Clutter

Do you remember the day that you purchased your current workstation? Maybe it was last week, last month, last year, or several years ago. At one point, it was pristine, untouched by the demands of the workday, but those days have long since passed. Over time, your computer collects all sorts of stuff on it, from unnecessary files to outdated, unused software.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Resolve the Blue Screen of Death

Tip of the Week: 4 Ways to Resolve the Blue Screen of Death

It’s quite possibly the most infamous screen image in computing: the Blue Screen of Death. Encountering this screen will often cause two thoughts to run through a user’s mind: what just happened, and how can I fix it?

Continue reading
0 Comments

As if Selecting Hardware Wasn’t Tricky Enough, Intel Went and Did This

As if Selecting Hardware Wasn’t Tricky Enough, Intel Went and Did This

Intel recently announced their next line of laptop processors, and with that single act, caused no small amount of frustration and confusion among the IT market. After claims that they were breaking from their traditional schedule of releasing a new processor each September and improving upon it later, Intel has gone ahead and released a new processor architecture instead of maintaining their Skylake processor from last year.

Continue reading
0 Comments

Microsoft Sets Itself Up Nicely With Windows Store Loophole

Microsoft Sets Itself Up Nicely With Windows Store Loophole

When you’re managing your business’s technology, you want to limit access to time-wasting applications and keep your employees from accessing the Windows Store. It just makes sense. Yet, for the businesses that want to restrict access to the Windows Store on Windows 10 devices, well, that’s too bad; Windows 10 Pro version 1511 just made your life a whole lot more difficult, unless you’re willing to pay extra for Windows 10 Enterprise edition.

Continue reading
0 Comments

Tip of the Week: Why Having an Extra Workstation is Worth It

Tip of the Week: Why Having an Extra Workstation is Worth It

For every business, it’s essential to be prepared for any unforeseen problems that can disrupt day-to-day operations. One easy way to do this is by keeping an extra workstation on hand.

Continue reading
0 Comments

Tip of the Week: 1GB, 2GB, 4GB or More - How Much RAM Do You Actually Need?

Tip of the Week: 1GB, 2GB, 4GB or More - How Much RAM Do You Actually Need?

You can tell when a workstation might need an upgrade if it’s slowing down, or if the machine is so absurdly slow that you can barely accomplish your daily tasks with it. One of the easiest ways you can improve the quality of your workstation is by increasing the amount of RAM.

Continue reading
0 Comments

Tip of the Week: How to Clean Your Monitor, Keyboard, and the Inside of Your PC

b2ap3_thumbnail_clean_computer_tips_400.jpgA clean computer is a happy computer. Just like any other piece of gadgetry, a computer requires regular cleanup sessions that allow users to get the most from them. In fact, January is known as Clean Up Your Computer Month, so what better way is there to ring in the new year than making sure your computer is in tip-top shape?

Continue reading
0 Comments

Reevaluate Your Network Switches Due to Increased Demand of Wireless Technology

b2ap3_thumbnail_business_network_switches_400.jpgYour computer network is only as strong as its weakest link. One of the most overlooked links is your network switch, and if your IT infrastructure is becoming more dependent upon wireless technology, then you’re going to want to perhaps upgrade your network switches.

Continue reading
0 Comments

Tip of the Week: 3 PC Best Practices You Need to Know

b2ap3_thumbnail_pc_practices_400.jpgSometimes the best thing you can do for yourself is return to the basics. For example, you can know all of the keyboard shortcuts in the world, but that doesn’t help you properly shut down your computer. Here are three tips for every computer user who wants to make sure that they’re using PC best practices.

Continue reading
0 Comments

Tip of the Week: Spot a Hacker By Investigating Their IP Address

b2ap3_thumbnail_ip_addresses_400.jpgHave you ever wondered how your PC is identified from the billions of devices out there in the world today? Just like every human being has specific physiological traits that make up who they are, your computer’s IP address is somewhat unique to your machine, and it can say a lot about you. Therefore, it’s important that you are able to identify your own IP address when you need to.

Continue reading
0 Comments

Nanotechnology Holds the Key to Doubling Computing Power

b2ap3_thumbnail_ibm_processor_400.jpgEarly in July, IBM announced that they have developed an ultra-dense computer chip that has roughly four times the computing capacity of today’s most powerful chips. These prototype chips, and ones they will develop to fuel computing into the next decade and beyond, are the result of the evolution of 21st century informatics.

Continue reading
0 Comments

Free Tool Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_pc_wifi_hot_spot_400.jpgWe’ve all had those moments where you desperately need a WiFi signal. Without one, how will you check your email? If you have a PC with a wireless card, you can take advantage of Connectify to turn your PC into a WiFi repeater, effectively extending your hotspot’s signal. With everyone looking to take advantage of wireless technology, a WiFi signal is necessary; so here’s how to make it a little better.

Continue reading
0 Comments

Tip of the Week: How to Check Your PC’s System Specifications

b2ap3_thumbnail_check_your_specs_400.jpgDo you know how much RAM is in your computer? How about its processors, or its graphics card? An inexperienced computer user might find it difficult to understand what exactly makes a computer tick. It doesn’t have to be difficult to find out all of these specifications. In fact, Microsoft makes it simple to find out all of the details about the computer you’re using.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Analytics Software as a Service CCTV Mail Merge Programming Cloud Business Growth Mirgation Knowledge High-Speed Internet E-Commerce Mobile Device Managment Processors Mobility Digital Payment Chrome Wearable Technology Modem Piracy Server Management Best Practice Apps How To Virtual Reality Solid State Drive Botnet WPA3 Hard Disk Drive Office 365 Managing Stress Management Augmented Reality IT Budget Vulnerability Scam Managed Services Provider PDF Notifications Tracking Monitors Application Bookmarks Backups Migration Statistics Social Wires WannaCry Google Calendar Procurement Remote Monitoring Disaster Resistance Cooperation End of Support Computer Care Operations IT Consulting Collaboration Microsoft Excel Law Enforcement eWaste RMM Typing Productivity Cybersecurity HIPAA Cables Word Automobile Intranet Legal Antivirus Update Productivity Sync 5G Shortcut User Tips Gadgets SaaS Cryptocurrency Smartphone Disaster Recovery Office Managed IT Service Passwords Internet Identities Business Owner IoT Permission Monitoring Hard Drive Business Intelligence Upgrade Managed IT services Travel Workplace Tips Dark Data Project Management Downloads Backup and Disaster Recovery Corporate Profile Data Backup Saving Money Co-managed IT Connectivity IT Consultant Recycling Experience WiFi Halloween Save Money Mouse Facebook Storage VoIP Computing Writing Alt Codes Password Screen Reader Big Data Infrastructure Star Wars Dark Web Legislation Windows 7 Web Server Two-factor Authentication Data loss Maintenance Zero-Day Threat Gadget Electronic Medical Records BYOD Innovation Settings Scary Stories Administrator Users Time Management The Internet of Things Superfish Social Networking Emoji Data storage Redundancy Language Access Control Save Time Spyware YouTube Theft Buisness Retail Android File Sharing Cyberattacks MSP Printing Google Maps Communication Vendor Management Going Green Samsung Safety Twitter OneNote Network Congestion Motion Sickness Staffing Network Security Mobile Office Asset Tracking Downtime Chromebook Mobile Education App Customer Service Regulations Wasting Time Alerts Work/Life Balance Spam Meetings Humor Utility Computing Distributed Denial of Service Cortana Customer Relationship Management Crowdsourcing Telephony Hiring/Firing Electronic Health Records Virus Conferencing Hosted Solution SharePoint Comparison Taxes Wi-Fi Data Recovery Software Business Management Business Continuity IT service Administration Blockchain Ransomware Competition Computers Public Speaking Bandwidth Tip of the Week Government Websites Document Management Entrepreneur Apple Servers VoIP Authorization Telephone Systems Data Breach Favorites Information Windows 10 Tip of the week Backup Router Virtual Desktop Hotspot Email Patch Management Business Risk Management Display Webcam Mobile Devices communications Mobile Computing Politics Cloud Computing 3D Printing Avoiding Downtime IT Support Budget Money Vulnerabilities Help Desk Social Media Google Docs IT Support Enterprise Resource Planning Search Best Practices Voice over Internet Protocol Lenovo Documents Data Warehousing ROI Managed IT Nanotechnology Staff Holiday Error Digital Signature Internet Exlporer Financial Compliance Smartphones Digital Small Business Network Analyitcs Trending Mobile Data Sports Robot Virtual Private Network Outlook Mobile Device Management Encryption Paperless Office Refrigeration Machine Learning Employee-Employer Relationship Cabling Fleet Tracking Drones G Suite Windows 8 Motherboard Troubleshooting Training Bring Your Own Device USB Networking Deep Learning Black Friday Automation Computer Gmail Bluetooth Internet of Things Instant Messaging Managed Service Hackers BDR Employer-Employee Relationship Specifications Recovery Identity Theft Heating/Cooling Black Market Company Culture Unsupported Software IBM Efficiency Upgrades Business Technology Phishing Features Firefox Employees Remote Monitoring and Management Running Cable Chatbots Notes Physical Security Phone System Cookies Test Computer Repair Laptop Windows PowerPoint Windows 10 Wireless Technology Hardware Development Microsoft CIO Server Finance Office Tips Flexibility Managed Service Provider Wireless Domains Unified Threat Management LiFi Data Security Environment Public Cloud Human Error Google Bitcoin Miscellaneous Licensing Consumers Remote Computing Virtual Assistant How To Undo Smart Tech Cameras Hard Drives Database Content Filtering Relocation Hacking Artificial Intelligence Personal Information Google Drive Proactive Technology Fun Saving Time Break Fix Read Only Cybercrime Techology Smart Technology Computing Infrastructure Healthcare Mobile Security Cyber Monday IP Address GPS Data Management Business Computing Health Security Cameras Supercomputer IT solutions Marketing Network Management User Presentation Outsourced IT Software Tips Cleaning Tablet Remote Worker Geography Malware Website IT Management Hacker Files Consulting Address Google Wallet IT Technicians Browser Virtualization Authentication User Error Managed IT Services Assessment Applications Microsoft Office Tech Term Operating System VPN Social Engineering Mobile Device Disaster Multi-Factor Security iPhone Proactive IT Professional Services Printer Lithium-ion Battery Tech Terms Remote Workers Identity Permissions Uninterrupted Power Supply Hacks History Current Events Cost Management Technology Tips Alert Consultation Privacy Information Technology Firewall IT Services Net Neutrality Data Cache Private Cloud Security Unified Threat Management Hosted Solutions Point of Sale Touchscreen Enterprise Content Management Fraud Quick Tips Unified Communications Tech Support Technology Laws

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code