Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Hasn’t Mobile Payment Really Taken Off?

Why Hasn’t Mobile Payment Really Taken Off?

Digital payment options have become commonplace in today’s society. In fact, ever since people could purchase goods and services off of the Internet, some of the world’s most successful companies are a result of digital payment. It was a natural progression then, as the mobile device boom came, that mobile payment would take the place of cash and/or cards and bring these digital payment options beyond the Internet, and into our retail stores. This simply hasn’t happened and here are four reasons why.

Continue reading

4 Hands-on Future Technologies for Spring 2017

4 Hands-on Future Technologies for Spring 2017

It’s fascinating to keep an eye on the latest technological developments, and the excitement really builds when concepts once deemed farfetched make their way onto the marketplace. Here are four technologies that we’re super excited to get our hands on!

Recent comment in this post
Evie McKellar
We have to use four hands it feels like make the multiple of the every hand with double then forcing for the future too. Reality o... Read More
Saturday, 16 March 2019 07:17
Continue reading
1 Comment

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Authentication Tech Terms Windows 10 Managed IT Screen Reader CCTV Current Events Upgrade Website Email Fleet Tracking Cybercrime Bluetooth Consumers Encryption Black Market IT solutions Tablet Data loss LiFi Processors Windows 8 Applications Nanotechnology communications IT Consulting Two-factor Authentication Sports Unified Threat Management Machine Learning Managed IT Services Customer Relationship Management IT Budget Legislation Personal Information Cooperation Mobile Security Black Friday CIO Outlook Save Time Consultation Multi-Factor Security Computing Infrastructure Managed Service Provider Writing Twitter Tip of the week Enterprise Resource Planning Lenovo Running Cable Financial IBM History Browser Trending Smartphones Microsoft Virus Content Filtering Software Tips Scary Stories Politics User Error Privacy Theft Data Data Breach Hacks Distributed Denial of Service Best Practice Mobile Data Mobile Device Management Mobile Government Emoji Quick Tips Geography Search SaaS Chromebook Password Wearable Technology Windows Administrator Monitoring Fun Productivity Technology Laws IT Services Break Fix Uninterrupted Power Supply Safety Information Malware Wireless Save Money Recycling IoT Storage Money Phone System Productivity Bandwidth Remote Monitoring and Management Lithium-ion Battery BDR Tracking Router Spam Holiday Recovery Electronic Health Records eWaste User Procurement Robot Data Warehousing Alert Innovation Network Congestion Infrastructure Analytics Modem Blockchain Spyware Company Culture Instant Messaging Unsupported Software Office Sync Cookies Laptop HIPAA Identity Theft Mobile Device Outsourced IT Cybersecurity PowerPoint Staffing Virtual Reality Computers Downtime IT Support Apps Net Neutrality Compliance Chatbots Google Maps Typing Data storage Hard Drives iPhone Avoiding Downtime How To Specifications Vulnerability Customer Service Vulnerabilities Healthcare Cyberattacks Gadgets IT Consultant Solid State Drive Windows 10 User Tips Presentation Google Wallet SharePoint Mouse Unified Threat Management YouTube Mobile Office Mobile Computing Meetings GPS Retail Websites High-Speed Internet Buisness Users Automation Business Technology Zero-Day Threat Networking Going Green Budget Heating/Cooling Mobile Devices Technology Apple Servers Co-managed IT Security App Unified Communications Finance Google Docs Training IT service Law Enforcement Wireless Technology RMM Connectivity Digital Virtual Private Network Features Hacking Hardware Troubleshooting Collaboration Mobile Device Managment Phishing Saving Time Remote Workers Undo Antivirus Project Management MSP Computer Repair VoIP Botnet Documents Social Maintenance Language Cloud Computing IT Management Google Drive Internet Operating System Backups Operations Social Media Settings Assessment Point of Sale Managing Stress Remote Computing Refrigeration Knowledge Mirgation Cables Statistics Bitcoin Paperless Office Business Continuity Smart Technology Shortcut Telephony Physical Security Error Motion Sickness Printing Tech Support Ransomware Health Tech Term Data Management File Sharing VoIP IT Support Patch Management Humor WannaCry Mobility Business Growth Office 365 Webcam Cleaning Legal Smart Tech Augmented Reality Star Wars Mail Merge Education Technology Tips Help Desk Redundancy Wi-Fi Regulations Miscellaneous Chrome End of Support Efficiency IT Technicians USB OneNote Professional Services Touchscreen Small Business Techology Access Control Managed Services Provider Document Management Software Supercomputer Human Error How To Hosted Solutions Server Information Technology Hard Disk Drive Address Risk Management Saving Money Software as a Service Flexibility Dark Data Hard Drive Gadget Notes ROI Communication Programming Intranet Firewall Wires IP Address Administration Printer Management Corporate Profile Entrepreneur WiFi Hotspot Samsung Employer-Employee Relationship Bring Your Own Device Disaster Resistance Relocation Motherboard Microsoft Office Word Consulting Read Only The Internet of Things Artificial Intelligence Disaster Halloween Permissions Drones 5G Business Management Favorites Cameras Backup and Disaster Recovery Time Management Test Hacker Public Cloud Gmail Microsoft Excel Network Facebook Business Server Management Domains Employee-Employer Relationship Automobile Downloads Alerts Workplace Tips Taxes Update Files Cabling Hosted Solution Piracy Digital Signature Dark Web Big Data E-Commerce Internet of Things Deep Learning WPA3 Disaster Recovery Travel Windows 7 Monitors Backup Upgrades Hackers Office Tips Application Business Owner Vendor Management Managed IT services Identity Business Intelligence Computing BYOD Display Employees Wasting Time Fraud Analyitcs Firefox VPN Hiring/Firing Proactive IT Notifications Android PDF Computer Public Speaking Virtualization Cost Management Cache Asset Tracking Virtual Desktop Managed IT Service Network Security Electronic Medical Records Remote Monitoring Work/Life Balance Bookmarks Managed Service Competition Migration Development Crowdsourcing Scam Smartphone Business Computing Identities Network Management Tip of the Week Data Backup Digital Payment Marketing Remote Worker Google Calendar Internet Exlporer Web Server Computer Care Authorization 3D Printing Social Engineering Utility Computing Private Cloud Data Recovery Permission Alt Codes Voice over Internet Protocol Proactive Experience Superfish Data Security Cryptocurrency Licensing Staff Environment Cortana Virtual Assistant Best Practices Enterprise Content Management Security Cameras G Suite Google Social Networking Comparison Telephone Systems Passwords Database Cyber Monday Conferencing Cloud

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...