Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cortana Gets a Little Too Clingy After Latest Update

Cortana Gets a Little Too Clingy After Latest Update

The idea of speaking to your device and having it perform tasks is hardly a new one. Siri and Google Now have long dominated this industry. Microsoft released Cortana in an attempt to enter the voice assistant race, but with Windows 10’s anniversary update, more harm than good could come from using Cortana.

Continue reading
0 Comments

Tip of the Week: 6 Chief Cortana Commands For You to Master

b2ap3_thumbnail_everyone_loves_cortana_400.jpgIn case you haven’t heard of her, Cortana is Microsoft’s voice assistant for Windows Phone and devices that utilize Windows 10. Just like Siri and Google Now, Cortana can be used for a lot more than simply performing a voice search. Here are six of the great new things Cortana can help you with.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Black Market Environment Content Filtering Google Drive Buisness High-Speed Internet Security Cameras Employer-Employee Relationship Robot Touchscreen Cleaning Password Vulnerabilities Privacy Business Technology Backup and Disaster Recovery Windows 10 Computing Upgrade Business Growth IBM Break Fix Budget Alert Miscellaneous Education Virtual Private Network IT service Address File Sharing Web Server HIPAA Access Control Marketing CCTV Technology Laws Licensing Recycling Digital Signature Managed IT Windows 8 Mobility Mirgation Flexibility Hiring/Firing Information Technology Healthcare GPS Apps Connectivity Hard Drives Documents Fleet Tracking Tip of the Week Remote Computing Instant Messaging Software as a Service Productivity Supercomputer Managed Service Provider Hacks Unified Communications Wires Networking Mobile Device Managment Chromebook Outlook Disaster Resistance Fraud Computer Repair Automation Going Green IT Support Private Cloud PDF Microsoft Excel Office 365 Processors Theft Cloud Disaster Ransomware Fun Public Cloud Comparison Development Computer Care Unified Threat Management Typing Business Saving Money Hosted Solution Piracy Recovery Windows 10 Smartphone Migration Money Virtual Desktop Cooperation Social Engineering Travel Saving Time Virus Meetings Best Practices Intranet Backups Save Money Cybersecurity Big Data Lithium-ion Battery YouTube Lenovo Hard Drive Regulations Humor Encryption IT Budget Net Neutrality Laptop Storage Google Docs Customer Service Gmail Specifications Cost Management Holiday Computing Infrastructure Identity Theft Hackers Operations Managed Service Operating System Update Tech Term Drones Virtualization Disaster Recovery Shortcut Staffing Statistics Microsoft Office User Tips Internet of Things Mobile Computing Mail Merge Virtual Reality Wi-Fi Upgrades IT Support Data Backup Managed IT Service BYOD Cookies Finance Physical Security Maintenance Safety Politics Productivity Cloud Computing Managing Stress Downloads SharePoint Mobile Office Backup Black Friday Artificial Intelligence Staff Scam Redundancy Cyber Monday Digital Payment Business Computing Dark Data Quick Tips Microsoft Unified Threat Management Passwords Infrastructure IT Management Competition Internet Training LiFi Blockchain IT Consulting CIO Application Project Management Facebook Data Breach Cyberattacks Experience Solid State Drive Electronic Medical Records Tip of the week Halloween Refrigeration Current Events ROI Cybercrime Identities Favorites G Suite Two-factor Authentication End of Support Phone System Efficiency Telephony Google Wallet Patch Management WiFi Server Management Managed IT services Procurement Technology Remote Worker Files Consulting Best Practice Social Networking Data Management Save Time Search Small Business MSP Mobile Legislation Zero-Day Threat Printing PowerPoint Heating/Cooling How To Proactive IT Word Firewall VoIP Time Management Remote Monitoring Bookmarks VPN WPA3 Users Network Security Office Chatbots Android Network Electronic Health Records Crowdsourcing Test IT Consultant Software Data Warehousing IT Services 3D Printing Google Calendar Mobile Device Management Smart Technology Business Intelligence Communication Telephone Systems Managed IT Services Collaboration Windows Malware Sync Spam Uninterrupted Power Supply Wireless Security Superfish Router Browser USB Innovation Distributed Denial of Service Downtime Utility Computing Tech Support Printer Legal Monitors Nanotechnology Document Management History Information Entrepreneur Email Phishing Gadgets Employees Law Enforcement App Workplace Tips Hotspot Notifications Undo Risk Management Retail Cortana Administration Tech Terms Data storage Botnet Website Unsupported Software IT Technicians Bitcoin Wearable Technology Company Culture Consumers Management Trending Data Geography Human Error The Internet of Things Websites Server Asset Tracking Public Speaking Firefox Settings Data Recovery BDR User Error Mobile Security Domains Data Security How To VoIP Paperless Office Tracking OneNote Running Cable Scary Stories Tablet Compliance Smartphones Remote Workers Motion Sickness Permissions Apple Error Programming Hardware Point of Sale Antivirus Software Tips Chrome Hacker Vulnerability Presentation Cameras Data loss Computers Mobile Devices Dark Web Co-managed IT Government Knowledge Health Cabling Enterprise Content Management Bandwidth IP Address Business Management Enterprise Resource Planning Cryptocurrency Social Mobile Device Conferencing Technology Tips Motherboard communications Hacking Administrator Spyware Hosted Solutions Smart Tech Relocation Help Desk Managed Services Provider Social Media Corporate Profile IoT Cables Cache Avoiding Downtime Outsourced IT Servers Network Management Vendor Management Business Owner Read Only IT solutions Proactive Deep Learning Modem Work/Life Balance Features Language Network Congestion iPhone Twitter Identity Financial Permission eWaste Automobile Business Continuity Writing Remote Monitoring and Management Wireless Technology Office Tips Google SaaS Emoji Bring Your Own Device 5G Monitoring Alt Codes Screen Reader Multi-Factor Security Authentication Star Wars Mouse Customer Relationship Management Augmented Reality WannaCry Personal Information User Machine Learning Consultation Assessment Employee-Employer Relationship Taxes Gadget Google Maps Mobile Data Bluetooth Webcam Hard Disk Drive Sports Display Internet Exlporer Alerts Samsung Digital Applications E-Commerce Computer Authorization Troubleshooting Analytics Techology Analyitcs RMM

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code