Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cortana Gets a Little Too Clingy After Latest Update

Cortana Gets a Little Too Clingy After Latest Update

The idea of speaking to your device and having it perform tasks is hardly a new one. Siri and Google Now have long dominated this industry. Microsoft released Cortana in an attempt to enter the voice assistant race, but with Windows 10’s anniversary update, more harm than good could come from using Cortana.

Continue reading
0 Comments

Tip of the Week: 6 Chief Cortana Commands For You to Master

b2ap3_thumbnail_everyone_loves_cortana_400.jpgIn case you haven’t heard of her, Cortana is Microsoft’s voice assistant for Windows Phone and devices that utilize Windows 10. Just like Siri and Google Now, Cortana can be used for a lot more than simply performing a voice search. Here are six of the great new things Cortana can help you with.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Browser Troubleshooting Antivirus Sports Training Mobile High-Speed Internet Hard Disk Drive Motion Sickness Proactive Disaster Office Tips YouTube Maintenance Website Web Server Unsupported Software Nanotechnology Network Congestion Productivity User Error Alt Codes Employees App Networking User Break Fix Distributed Denial of Service Consulting eWaste CCTV Software Tips Meetings Update Hacking Dark Web Network Monitoring Phishing Enterprise Resource Planning Point of Sale Remote Worker Black Friday Help Desk RMM Redundancy Identity Disaster Recovery Data Management Read Only Piracy Legislation Alert Favorites Disaster Resistance Mouse Data Wasting Time IT service Professional Services Analyitcs Big Data Virtual Desktop Dark Data Business Owner Features Time Management Database Data loss Cybercrime Government 5G SaaS 3D Printing Cabling Social Media Modem Zero-Day Threat Data Security Deep Learning Vulnerabilities Computer IT solutions Managed Service Provider Software as a Service Cost Management Identity Theft Work/Life Balance How To Robot Solid State Drive Cameras Scary Stories Cyberattacks Mobile Device Management Blockchain Chatbots Refrigeration Computer Care Tech Terms Wireless Buisness Co-managed IT Address Computer Repair CIO Heating/Cooling Compliance Taxes Law Enforcement Best Practices Paperless Office Wi-Fi Business Intelligence Collaboration Vulnerability Money Phone System Computers Fun Proactive IT Administrator Lithium-ion Battery Chromebook Remote Workers Server Management Budget Competition Saving Money Firewall Mobile Device Managment Bookmarks Microsoft Office Human Error Microsoft Excel Word Education Sync Google Drive Multi-Factor Security Google Wallet Data Breach IT Consulting Physical Security Consumers Management Wireless Technology Apps Tracking Recycling Chrome Development Automobile Mobile Devices Managed IT Service Virtual Assistant Saving Time Cloud Computing Users Printing Quick Tips Digital Signature Server Drones Downtime Telephony Social Engineering Knowledge Programming Internet Exlporer Domains Outlook Botnet iPhone Hard Drives HIPAA Hacker IBM Tip of the week Consultation Information Content Filtering The Internet of Things Unified Communications Backup and Disaster Recovery Outsourced IT Touchscreen Analytics Travel IT Support Firefox Health Email Miscellaneous Employer-Employee Relationship Holiday Security Cameras Cables Business Privacy Environment Business Continuity Connectivity Authorization Twitter Corporate Profile Staffing WannaCry Files Office Managed IT Services Star Wars Enterprise Content Management Hosted Solution IT Management Uninterrupted Power Supply Printer Experience Virtual Private Network Data Recovery Business Management USB Cryptocurrency Digital Finance Bring Your Own Device Theft Staff IP Address Bitcoin Microsoft Workplace Tips Notifications PowerPoint Mobile Device Best Practice OneNote Virtual Reality communications Innovation Social Networking Managed Services Provider Writing Managed IT services Tech Support Cleaning History Servers Virus Notes E-Commerce Fleet Tracking Security Mobile Office Computing Cybersecurity Flexibility Identities Humor Virtualization Smartphones Electronic Health Records Cyber Monday Migration Recovery Licensing Mobile Computing Save Money Applications Computing Infrastructure Mobility Upgrade Unified Threat Management File Sharing VoIP Machine Learning Windows 7 Risk Management Windows 10 Password Backups Google Maps Marketing Webcam Small Business Customer Relationship Management Telephone Systems Access Control Display Downloads Business Technology Operating System Shortcut Supercomputer Permission Data Backup WiFi Search Operations Vendor Management Office 365 Processors IT Budget IoT Assessment Samsung Unified Threat Management Cache Safety Permissions Presentation SharePoint Healthcare Infrastructure Managed IT Avoiding Downtime Gadget Cookies Smart Tech Company Culture Hacks Error Legal ROI Administration Mobile Data VoIP IT Support Social Specifications Gmail Private Cloud Laptop Windows Customer Service Internet of Things Motherboard Language Relocation Entrepreneur Hackers Backup Monitors Wires Facebook Data storage Business Growth Net Neutrality Retail MSP PDF Digital Payment Documents Mail Merge Efficiency Cortana Project Management Internet IT Technicians Test Productivity Communication Windows 10 Hiring/Firing Data Warehousing Two-factor Authentication Encryption Bandwidth Conferencing Typing User Tips Hosted Solutions Managing Stress Cooperation Electronic Medical Records Google Docs Tip of the Week Technology Laws Lenovo Personal Information Wearable Technology GPS Comparison VPN G Suite Software Hotspot IT Consultant Cloud Intranet Geography Storage Utility Computing Instant Messaging Politics Crowdsourcing Apple Windows 8 Black Market Alerts Google Mirgation Settings Tech Term Managed Service Upgrades Artificial Intelligence Remote Computing LiFi Public Speaking Automation Network Security Statistics Procurement End of Support Ransomware Fraud Smartphone Employee-Employer Relationship WPA3 Hard Drive Techology Authentication Information Technology Websites Passwords Save Time Tablet BYOD Router Mobile Security Technology Tips Application Voice over Internet Protocol Bluetooth Halloween Public Cloud Screen Reader Technology Remote Monitoring and Management Gadgets Google Calendar Trending How To Superfish Augmented Reality Scam Patch Management Smart Technology Current Events Asset Tracking Running Cable Spyware Emoji Undo BDR Malware Remote Monitoring Financial Spam Business Computing Network Management Hardware Going Green IT Services Document Management Android Regulations

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code