Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Police Recruit Eagles to Take Out Illegal Drones... Seriously

b2ap3_thumbnail_eagles_for_drones_400.jpgWhile they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Google Calendar Social Hiring/Firing Experience IT Services eWaste Retail Disaster Maintenance USB SaaS Monitors Authentication Server IT Support Paperless Office Update Electronic Health Records Hard Drive Superfish Human Error Dark Web Private Cloud Virtual Assistant The Internet of Things Hackers Smart Tech Mobile Office Government communications Social Networking Star Wars WannaCry Black Friday Storage Sync Access Control Computers Unified Threat Management Lithium-ion Battery Telephony Operations IT Budget Money Enterprise Resource Planning Data storage Managed Service Provider App Cybersecurity Robot Mobile Device Best Practice MSP Law Enforcement Network Security 3D Printing Competition Business Management Fraud Error Twitter Hacks Data Management Laptop Cleaning Managed Service Writing WPA3 Education Recycling Blockchain Search Entrepreneur Infrastructure User Error Asset Tracking Instant Messaging Utility Computing Business Cortana Operating System Co-managed IT Analytics Email History Data loss Best Practices Gmail Healthcare Cameras Machine Learning Tip of the week Bitcoin Holiday Innovation Alerts ROI Documents Heating/Cooling Microsoft Excel Document Management Employees Cache Networking Wireless Technology Computing Digital Flexibility Chromebook Project Management Fleet Tracking Router Web Server Information Technology Politics Computer Care Nanotechnology Data Breach Troubleshooting PowerPoint Procurement Tech Terms Intranet How To Virtual Reality Black Market Virtualization Enterprise Content Management Corporate Profile Business Computing Authorization Cables Digital Signature Apple Scam Computer Repair Specifications Administration Digital Payment Meetings Relocation Malware Computing Infrastructure Tablet Gadget Connectivity Employer-Employee Relationship Word Multi-Factor Security Personal Information Regulations Trending Wireless Browser Printer Mobile Device Management Hardware GPS Office Saving Time Domains Motherboard IP Address Automation OneNote Disaster Resistance Public Cloud Sports Database 5G Statistics Internet Phone System Solid State Drive PDF Scary Stories Safety Content Filtering File Sharing Mobile Security Notes Files Chrome Remote Worker Communication E-Commerce YouTube How To Software as a Service Password Internet of Things Software Tips Collaboration IT Consultant Windows 10 Mobile Computing Techology BDR Training Alt Codes Data Recovery Google Drive Zero-Day Threat Programming Test Identities Mirgation Internet Exlporer Consulting Smartphone Office 365 Net Neutrality Patch Management Voice over Internet Protocol HIPAA Processors Settings Passwords Users Vendor Management Windows Automobile Features Travel Work/Life Balance Redundancy Halloween Company Culture Managed IT Google Maps Identity Theft Legal Unsupported Software Public Speaking Windows 10 Financial Data Security Analyitcs Outsourced IT Finance Presentation User Tips Business Intelligence Server Management Customer Relationship Management Smart Technology Read Only Environment Backup and Disaster Recovery Vulnerabilities RMM WiFi Business Owner Cooperation Remote Monitoring Humor Crowdsourcing Notifications Productivity Tech Support Mobility Vulnerability Mobile Data Time Management Hacking Smartphones Cookies Recovery Tech Term Monitoring Workplace Tips Display Virtual Desktop Proactive IT Outlook Emoji Security Telephone Systems Downloads Hotspot Productivity IT Consulting Ransomware Virtual Private Network Gadgets Technology Laws Social Engineering Google Wires Quick Tips Health Windows 7 Bluetooth Unified Communications Mail Merge Language Data Hacker BYOD Managed IT Services Upgrade Management Administrator Samsung Saving Money Deep Learning Remote Workers Encryption Website Taxes G Suite VoIP Permissions Undo Android Remote Computing Cloud Wi-Fi Licensing Bookmarks Going Green Computer Refrigeration Professional Services Cyber Monday Wearable Technology Theft Wasting Time Compliance Antivirus Geography Tracking Uninterrupted Power Supply Risk Management Backup Software Network Management Microsoft Office Hard Drives Artificial Intelligence Augmented Reality Spyware Hosted Solutions Assessment Legislation Favorites Google Docs Network Touchscreen Shortcut Consultation IoT Botnet Proactive Managing Stress Servers Social Media Webcam Technology Tips Mobile Devices IT Technicians LiFi Big Data Marketing Comparison Data Warehousing Websites End of Support Screen Reader Motion Sickness Phishing Disaster Recovery iPhone Apps Identity Address Dark Data Information Virus SharePoint Consumers VoIP Save Time Security Cameras Mobile Device Managment Avoiding Downtime Electronic Medical Records Drones Cryptocurrency Budget Windows 8 Hosted Solution Business Continuity Business Growth Privacy Fun Cybercrime Migration IT Management IT solutions Backups Cyberattacks Development Miscellaneous Office Tips Help Desk Firewall Cost Management IBM Staff Chatbots Current Events Google Wallet Bandwidth Alert Knowledge Point of Sale Two-factor Authentication Bring Your Own Device Mouse VPN Remote Monitoring and Management Applications Managed IT services Buisness Spam Mobile Data Backup Managed IT Service Cabling Efficiency Typing CIO High-Speed Internet Employee-Employer Relationship Break Fix Lenovo Downtime Permission Supercomputer Staffing Running Cable Upgrades IT service CCTV Technology Physical Security Save Money Distributed Denial of Service Firefox Conferencing Customer Service User IT Support Application Modem Unified Threat Management Business Technology Tip of the Week Printing Piracy Facebook Hard Disk Drive Microsoft Small Business Network Congestion Managed Services Provider Cloud Computing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...