Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

41 Microsoft Software Titles Reached Their End of Extend Support or End of Life - In April Alone!

b2ap3_thumbnail_microsoft_eol_400.jpgYou don’t need us to tell you that Microsoft has an extensive library of software products aimed at all kinds of businesses. But, of course, nothing good can last forever, and old solutions eventually give way to more versatile or efficient versions. When this happens, Microsoft stops supporting older software in order to provide better features and experiences to users of more recent versions.

Continue reading

Tip of the Week: Know When Your Windows OS Expires and Why it Matters

b2ap3_thumbnail_end_of_life_headache_400.jpgBy design, Microsoft’s operating systems aren’t built to last forever. Due to the fact that technology is always changing, new operating systems with better security and improved capabilities are routinely needed. Microsoft gets users to transition from an older OS to a newer one by ending support for the older one. This begs the question, how long until Microsoft pulls the plug on your OS?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Cookies Employees Consumers Management Upgrades Regulations Cameras Mobile Computing WiFi Small Business Company Culture Office 365 Licensing Flexibility Lenovo Remote Worker IT service Techology Social Engineering Chatbots Information Word Mirgation Automobile Electronic Health Records Managed IT services Antivirus SaaS End of Support Hackers IT Support Google Drive Relocation Personal Information IoT User Compliance Favorites IT solutions Public Speaking Telephone Systems Disaster Resistance Browser Legislation Business Owner Data Business Growth Unsupported Software Google Computer YouTube Best Practice Touchscreen Zero-Day Threat Mobile Data Authorization Presentation Database Robot Phishing Fraud Hiring/Firing Microsoft Virus Storage Network Congestion Asset Tracking Internet G Suite VoIP Refrigeration Digital Payment GPS Microsoft Office Retail Computers Customer Service OneNote Drones Healthcare Mobile Device Alt Codes Redundancy Maintenance Monitors Cyber Monday Competition Virtual Desktop Piracy Identity Theft Document Management Printing Alert Time Management Connectivity Comparison Co-managed IT Crowdsourcing Modem Scam Network Notes Applications Outsourced IT Malware CIO Managed Services Provider How To Privacy Documents Hosted Solution Google Calendar Identities Quick Tips Alerts Managed IT Service Computer Repair Recovery Tablet Data loss Superfish Digital Signature User Error Address Travel Cybercrime Managed Service Provider communications Recycling Point of Sale Hacking Knowledge High-Speed Internet Consultation Nanotechnology Gadget Staffing Private Cloud Workplace Tips Current Events Network Management Twitter Hacker Wireless Wires Password Undo Gmail Geography Budget Big Data Laptop Saving Money Help Desk Employer-Employee Relationship Best Practices Solid State Drive Data Breach Data storage Web Server Wearable Technology Facebook WannaCry Cyberattacks Instant Messaging Holiday Computing Infrastructure Humor Business Management Shortcut Wi-Fi Voice over Internet Protocol Unified Threat Management Tip of the week Upgrade The Internet of Things Patch Management Unified Threat Management Productivity Development Firewall Bluetooth Cabling Bring Your Own Device IT Management Lithium-ion Battery Fleet Tracking Tech Support Social Test CCTV Social Networking Intranet E-Commerce Remote Workers Black Friday Operations Supercomputer Backup and Disaster Recovery ROI Cost Management Infrastructure IT Budget Experience Update Bitcoin Website Telephony Servers Smart Technology Cloud Computing Cloud MSP Cables Star Wars Hard Disk Drive Tech Term Users Email Domains Permissions Conferencing Multi-Factor Security Vulnerability Scary Stories Communication Uninterrupted Power Supply Proactive Save Time IBM HIPAA Data Security Motion Sickness Specifications Typing File Sharing Dark Web How To Project Management Virtual Private Network Samsung Halloween Networking Processors Physical Security Virtual Assistant Sync iPhone Botnet Smartphone Hosted Solutions Server Management Encryption Data Recovery SharePoint Windows 7 Enterprise Resource Planning Backups Blockchain Managing Stress Financial Display Virtualization Webcam Technology Productivity Taxes Analyitcs Authentication Marketing Remote Monitoring Trending Administration Bandwidth Entrepreneur Managed IT Services Business Continuity Websites Buisness Vendor Management USB Legal Administrator Ransomware Mobile Device Management IT Support Avoiding Downtime Going Green Corporate Profile Education Screen Reader Black Market Hardware Collaboration Mail Merge Data Management Consulting App IT Consulting Net Neutrality Permission eWaste Mobile Security Router Automation Paperless Office Identity Software as a Service Hacks Environment Utility Computing LiFi Heating/Cooling Procurement Law Enforcement Electronic Medical Records Wasting Time Hard Drive VPN Tip of the Week Training PDF Remote Monitoring and Management Google Maps Work/Life Balance Finance Chromebook Backup Notifications Google Docs Security Cameras Business Technology Computing IT Technicians Efficiency Information Technology 5G Health Enterprise Content Management Migration Passwords Cryptocurrency Smartphones Software Mobility Phone System Apps Hotspot Computer Care Running Cable Content Filtering Deep Learning Managed Service Managed IT Wireless Technology Hard Drives Artificial Intelligence Microsoft Excel Miscellaneous Mobile 3D Printing Chrome Remote Computing Data Backup Analytics Meetings Digital WPA3 Spyware Outlook Theft BYOD Software Tips Augmented Reality Error Windows 10 Disaster Recovery Professional Services Government Business Android Innovation Cybersecurity Read Only Downloads Search BDR Two-factor Authentication PowerPoint Tech Terms Break Fix Vulnerabilities Language IP Address Assessment Cooperation Windows 8 Security Office Windows Internet Exlporer Troubleshooting Apple Printer Unified Communications Network Security RMM Mobile Devices Programming Operating System Cleaning Customer Relationship Management User Tips Motherboard Statistics Mobile Office Social Media Machine Learning Staff Risk Management Cache Data Warehousing History Smart Tech Access Control Technology Laws Mobile Device Managment Server Sports Fun Google Wallet Public Cloud Writing Money Human Error Politics Files Mouse Office Tips Settings Save Money Employee-Employer Relationship Emoji Downtime Disaster Internet of Things IT Services Features Technology Tips Dark Data Bookmarks Distributed Denial of Service Application Firefox Business Computing Virtual Reality Windows 10 Spam IT Consultant Monitoring Saving Time Safety Tracking Business Intelligence Proactive IT Cortana VoIP Gadgets

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...