Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Hard Disk Drive Sync Mobile Devices Connectivity Microsoft Office YouTube IT Budget Domains Net Neutrality PDF Storage Alt Codes Law Enforcement Language Finance Processors Data Warehousing Dark Web Recovery Disaster Recovery Operating System Employer-Employee Relationship VoIP Networking Automation Saving Money Authorization High-Speed Internet Windows 8 Managed IT Data Breach Technology Statistics Business Facebook Wireless Samsung Quick Tips Save Money Document Management Migration Phishing Dark Data Tech Terms Firewall Managed Service Identities Blockchain Health Maintenance Black Friday Screen Reader Software Tips Virtual Assistant Consultation Android Proactive Running Cable Education Virtualization Computing Infrastructure RMM IT service IT Management Data Recovery Chrome Public Cloud Mobile Device Management Break Fix Server Firefox Vendor Management Website Going Green Outlook Documents Social Media Tech Support Asset Tracking Information Technology Hosted Solutions Hiring/Firing Operations Bitcoin Risk Management Smartphone Emoji Encryption Supercomputer CCTV IT Consultant Downtime Managed IT Service Piracy Cleaning Favorites VPN Bookmarks Office IT Support Tablet Utility Computing Information Printing Bring Your Own Device Business Growth Server Management Point of Sale Typing IT Consulting Management Communication Presentation Downloads Crowdsourcing Electronic Health Records Business Owner Vulnerability Hackers Programming Microsoft IT Support Legislation Bandwidth Analytics Automobile Administrator Data storage Corporate Profile Entrepreneur Alerts Mouse Analyitcs Remote Monitoring and Management Internet Exlporer Error Multi-Factor Security Application Efficiency ROI Paperless Office Content Filtering Monitoring Customer Service Technology Tips Mirgation Data PowerPoint Read Only iPhone Upgrades Virtual Private Network Holiday Vulnerabilities Microsoft Excel BDR Robot Managed IT services Google Drive Data Security Productivity Google Wallet Knowledge Administration E-Commerce VoIP Hacker Project Management Motherboard Big Data Regulations Public Speaking Development Collaboration Wi-Fi Gadget Unified Threat Management Conferencing Innovation Display Smart Technology Wasting Time Botnet USB Hardware Remote Computing Staff Travel Outsourced IT Email Competition Ransomware Business Continuity Software as a Service Cyber Monday Consumers WiFi BYOD 3D Printing Tip of the Week Time Management Deep Learning Employees Tip of the week Backup and Disaster Recovery Smartphones Browser Miscellaneous End of Support Cloud Comparison CIO Augmented Reality Heating/Cooling Test Network Management Google Maps Budget User Error GPS Features Managed Service Provider Electronic Medical Records Google eWaste Black Market Upgrade Cooperation Zero-Day Threat Troubleshooting Help Desk Users Wearable Technology Digital Payment Passwords Remote Workers Scam Fun Specifications Mobility IT Services Notifications Search Spam Healthcare Artificial Intelligence 5G OneNote Chatbots Network Congestion Humor Unified Communications Computer Lenovo Employee-Employer Relationship How To Phone System Scary Stories Virus Patch Management Mobile Office Refrigeration Training Virtual Desktop Apps Hacks Disaster Assessment Smart Tech Office Tips Solid State Drive Experience Current Events Human Error G Suite Update Retail Notes Intranet Security Trending Distributed Denial of Service IBM Settings Redundancy Safety Business Intelligence Laptop communications Voice over Internet Protocol Two-factor Authentication Disaster Resistance Cables Apple Mobile Security Infrastructure Marketing Halloween Database File Sharing Superfish Enterprise Resource Planning Address Relocation Windows 10 Network Remote Worker Hard Drives Meetings Money Managed IT Services Touchscreen Work/Life Balance Printer History Enterprise Content Management Data loss Unsupported Software Word WannaCry Customer Relationship Management Consulting Workplace Tips Motion Sickness Physical Security Computers Licensing Hacking Permission LiFi Websites Access Control Internet Nanotechnology Business Technology Telephony Hosted Solution Star Wars Cyberattacks Machine Learning Windows 7 Social How To Techology Staffing Cost Management Shortcut IP Address HIPAA Uninterrupted Power Supply The Internet of Things Wireless Technology Cookies Sports SaaS Office 365 IoT Fraud Saving Time Webcam Social Engineering Instant Messaging Telephone Systems Private Cloud Tracking Lithium-ion Battery Gmail Authentication Permissions Fleet Tracking WPA3 Applications Small Business Procurement Mobile Device Undo Drones Google Docs Cabling Antivirus Cybersecurity Cameras Environment User Tips Productivity Identity Theft Best Practice Computing Buisness Hotspot Managed Services Provider Alert Avoiding Downtime Security Cameras Password Computer Care Professional Services Backups Modem Spyware Technology Laws Privacy Business Computing Best Practices Geography Virtual Reality Compliance SharePoint Cortana Business Management Politics Data Management Digital Signature Unified Threat Management Proactive IT Monitors Theft Cybercrime Flexibility Digital Web Server Cache Software Financial Router IT Technicians Legal Computer Repair Files Cryptocurrency Identity Hard Drive Remote Monitoring User Personal Information Government Mail Merge App Windows 10 Co-managed IT Taxes Mobile Computing Company Culture Malware Chromebook IT solutions Wires Backup Writing Social Networking Mobile Device Managment Mobile Data Save Time Data Backup Internet of Things MSP Twitter Managing Stress Windows Mobile Gadgets Cloud Computing Tech Term Recycling Bluetooth Google Calendar Network Security Servers

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...