Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

As far as leaps in computing go, this one’s pretty tiny: a research team from IBM has managed to store data on a single atom. Despite the microscopic size of the result, the impact is potentially huge when one considers the effects this discovery could have on computing.

Continue reading
0 Comments

On-Site Backup vs. Cloud-Based Backup, Which is Better?

On-Site Backup vs. Cloud-Based Backup, Which is Better?

There’s no doubting that data backup is a critical component of any small and medium-sized business’s infrastructure. Backup and disaster recovery is important in the event that your organization experiences a death-blow in the form of a data loss disaster. Yet, there’s some debate as to whether an on-site data backup solution can be as effective as the cloud. The verdict: both are essential.

Continue reading
0 Comments

From Magnetic Tape to the Cloud: A Brief Look at the Past 60 Years of Data Storage

b2ap3_thumbnail_history_of_data_storage_400.jpgData storage is such an important part of today’s business environment, but when was the last time you took the time to consider technologies that came before? Technology that exists today couldn’t possibly have existed 50, or even 20 years ago. How have the leaps and bounds made in the tech industry affected the status of data storage, and what does this trend mean for small and medium-sized businesses?

Continue reading
0 Comments

New Technology Delivers Staggering Data Retention Options

b2ap3_thumbnail_light_data_storage_400.jpgAs more data systems develop the need for structured data storage, the development of fast and secure solutions have become essential to the viability of storing and retrieving data. Scientists have been looking at the field of optoelectronics to develop constructs where an enormous amount of data can be stored for exorbitant amounts of time.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Fleet Tracking Electronic Health Records Mobile Help Desk Wires Data Security Notes App Windows Business Management Administration G Suite Fun Identity PowerPoint Wireless Technology Cryptocurrency Ransomware Specifications Relocation History Hard Drive Information Technology Operating System Tip of the Week The Internet of Things Shortcut Monitoring Notifications Backup Writing Storage Botnet Nanotechnology Operations Phishing Website Zero-Day Threat Applications Work/Life Balance Spam Update Asset Tracking Net Neutrality BDR Virtual Assistant Employer-Employee Relationship Augmented Reality WPA3 Health Wi-Fi Business Software as a Service Blockchain Time Management Efficiency Vendor Management Motion Sickness Cooperation Network Supercomputer Read Only WiFi Hacking User Tips Education Compliance WannaCry Application Computing User Error Recycling Web Server Proactive IT Paperless Office Motherboard Administrator IT solutions Server Management Consultation GPS Knowledge High-Speed Internet Development Computer Repair Professional Services Programming Deep Learning Remote Monitoring Finance Current Events Mobile Device Managment USB Favorites VoIP Identities IT Services CIO Going Green Tech Support Outlook Analyitcs Hosted Solution Financial Statistics Settings Personal Information Microsoft Excel Data loss Samsung Gmail Virtual Desktop Wireless Firewall Test Patch Management Law Enforcement Data Warehousing Android Humor Mirgation Drones Holiday Software Licensing Windows 10 IT Budget Business Intelligence Business Computing Remote Worker OneNote Apple Unified Communications Display Enterprise Content Management Unsupported Software Printing Private Cloud Government Language Smart Technology Security Cameras End of Support Tracking Theft Spyware Gadget Avoiding Downtime Voice over Internet Protocol Tech Terms Data Recovery Utility Computing Bluetooth Managed Service Provider communications Scam Technology Laws Smartphone Outsourced IT Quick Tips Instant Messaging Multi-Factor Security Mouse Managed IT Business Continuity Assessment Network Management Flexibility Corporate Profile Word Document Management YouTube Staff Undo IT Consulting Mobile Security Downloads BYOD Unified Threat Management Cloud Computing IP Address Hardware iPhone Managed Services Provider Management Chatbots Disaster Passwords Geography Workplace Tips Consulting Redundancy Maintenance Computer Care Experience Hiring/Firing Digital Payment Electronic Medical Records Modem Lithium-ion Battery Save Time Cache Error Apps Data Backup Vulnerability Employee-Employer Relationship Mobile Devices Public Speaking Unified Threat Management Procurement Entrepreneur Windows 7 Virtual Reality Lenovo Virtual Private Network Miscellaneous Healthcare Company Culture Proactive Computing Infrastructure Customer Service Co-managed IT Cybercrime Comparison Computer Identity Theft Network Congestion Money IT Technicians Social Engineering Conferencing Twitter Computers Router Technology VoIP Bitcoin Data Marketing Firefox ROI Star Wars Physical Security Alerts Recovery Black Friday Mobility Remote Monitoring and Management Two-factor Authentication Wasting Time Technology Tips Dark Data LiFi Laptop Microsoft Office Tips Public Cloud Business Technology Wearable Technology Emoji Permission IoT Refrigeration Security Alert Dark Web Risk Management Innovation Features Cameras Social Networking Software Tips Connectivity Collaboration Telephone Systems 3D Printing Upgrade Domains Meetings Google HIPAA Data storage MSP Bring Your Own Device Websites Break Fix Training CCTV How To Privacy Backup and Disaster Recovery Vulnerabilities Staffing Fraud IBM Mobile Computing Hackers How To Environment Windows 8 Cleaning Server Managed IT services Smart Tech Email Network Security Mobile Office Productivity Cost Management Enterprise Resource Planning Screen Reader File Sharing Migration Chromebook Safety Microsoft Office Scary Stories Hotspot Cloud Downtime Cabling Point of Sale Disaster Resistance Facebook Database Piracy Best Practice Buisness Intranet Virus Address Sync Hard Disk Drive Hosted Solutions Office Backups Robot Distributed Denial of Service Small Business Password Authentication Mobile Device Automobile SaaS Files Antivirus Browser Sports Cookies PDF Artificial Intelligence Big Data Techology Tip of the week Upgrades Mail Merge Processors SharePoint Search Managed Service Regulations Cables Customer Relationship Management Communication Digital Signature Saving Money Cyberattacks Internet Business Growth Printer Trending Office 365 Hacks Legislation Bandwidth Telephony Information Google Docs Project Management Data Breach eWaste 5G User Cortana Hard Drives Taxes Phone System Remote Workers Google Drive Servers Mobile Device Management Infrastructure VPN Productivity Windows 10 Legal Cyber Monday Malware E-Commerce Smartphones Social Media Hacker Google Wallet Networking Black Market Presentation Travel Authorization Retail Monitors Documents Alt Codes Budget Digital Tech Term Bookmarks Save Money RMM IT Consultant Data Management IT Support Disaster Recovery Encryption Superfish Cybersecurity Automation IT service Permissions Managed IT Service IT Support Analytics Managing Stress Consumers Competition Running Cable Remote Computing Internet of Things Touchscreen Uninterrupted Power Supply Politics Social Virtualization Crowdsourcing Access Control Human Error Managed IT Services Heating/Cooling Best Practices Troubleshooting Tablet Mobile Data Employees Typing Gadgets Users Solid State Drive IT Management Chrome Internet Exlporer Google Maps Saving Time Webcam Google Calendar Content Filtering Machine Learning Business Owner Halloween

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code