Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Think Twice about Throwing Away Working Technology

b2ap3_thumbnail_ewaste_becoming_a_major_issue_400.jpgWhen it comes to getting new technology, it’s typical to spend a significant amount of time agonizing over which product is the best. All the while, little regard is given to the disposal of one’s old tech, which often gets tossed in the trash. You may not have realized it, but haphazardly disposing of our old technology is wreaking havoc on the environment.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Black Friday Healthcare Private Cloud Fleet Tracking Data Backup YouTube Electronic Health Records Managed Services Provider Emoji Hosted Solutions Notes Innovation Remote Monitoring Telephony Windows 7 Wireless Technology Undo Training Twitter Storage Google Calendar Spyware SaaS Website Firefox Data storage Money Alt Codes Computer Care Connectivity Wi-Fi Proactive Web Server Network Computer CCTV Personal Information IT Consulting Time Management Alerts G Suite Data Breach Bring Your Own Device Smart Tech Security Printing Distributed Denial of Service Google Company Culture Cooperation Remote Workers Best Practice Unified Communications Infrastructure GPS iPhone Tracking Security Cameras Authentication Content Filtering Help Desk Social Engineering Touchscreen Phishing Maintenance Downtime How To Data Security Network Security Deep Learning Google Wallet Employees Programming Data Recovery Digital Payment Bluetooth User Workplace Tips Going Green Consultation Public Cloud Smartphones Tip of the week Cost Management Big Data Managed IT Services Files Electronic Medical Records Data Internet Exlporer Phone System Windows 10 Windows 10 Webcam Shortcut Hacks Crowdsourcing Laptop USB Chrome Cleaning Gadgets Recovery Antivirus Operations Disaster Managed IT Service Holiday Fun Paperless Office Backup and Disaster Recovery Samsung Cybersecurity RMM Superfish Computing Infrastructure Drones Migration Productivity Unified Threat Management Cryptocurrency Work/Life Balance Hacker Read Only SharePoint Enterprise Resource Planning Miscellaneous Google Drive Tech Term Address 5G Mobile Data Meetings Virtual Private Network Printer Presentation Intranet Android Staff Nanotechnology Identities Modem CIO Machine Learning Hard Drive Firewall Password Legal Apps Windows Marketing Digital Signature End of Support Cables Analytics Lithium-ion Battery Information Technology Data Warehousing Apple Websites WannaCry Conferencing Physical Security Best Practices Supercomputer IT Consultant Project Management Browser Social Networking File Sharing Hacking Smart Technology Spam Motion Sickness Trending Retail Update Identity Theft Facebook Permission IT Support BDR Software as a Service Microsoft Excel Office 365 Augmented Reality Robot Troubleshooting High-Speed Internet Google Docs Virtual Reality Business Technology Managed Service Provider Hotspot Database Privacy Remote Computing Hackers Co-managed IT Office Tips Employee-Employer Relationship Patch Management Bandwidth PDF Dark Data Utility Computing Encryption Downloads Dark Web Wires Mirgation Artificial Intelligence Business Management Bookmarks Error Enterprise Content Management Disaster Recovery Efficiency IP Address Business Continuity WiFi Mobile Device Management Alert Mobile Security Test Language Proactive IT Redundancy Tablet Recycling Malware Customer Service Unsupported Software Cache Government Mail Merge Blockchain Business Growth Social IoT ROI Data loss Bitcoin Sync Professional Services Development Motherboard Technology Mobile Device Managment Cloud Computing Access Control Typing Mobile Devices Public Speaking Vulnerability Microsoft Office Operating System Ransomware How To Identity Hosted Solution Domains Permissions Network Management Cortana Buisness Education Mouse Email Monitors Windows 8 Automation Mobile Screen Reader Scam Assessment Legislation Tech Support IT service IT solutions Outsourced IT OneNote Multi-Factor Security MSP Entrepreneur Google Maps Current Events Techology Heating/Cooling Quick Tips Avoiding Downtime Virtual Desktop Licensing Business Intelligence Data Management IT Technicians Management Humor Saving Money Administration Hardware Mobile Device User Error Asset Tracking Microsoft Communication Computers History Wireless User Tips Comparison IT Support Gmail Technology Tips Router Saving Time Fraud Cabling Cybercrime Business LiFi Digital Outlook Theft Backup Authorization Networking Internet of Things Users Software Tips Star Wars Collaboration Customer Relationship Management Wearable Technology Technology Laws communications Environment VPN Cloud VoIP Corporate Profile Health Finance Unified Threat Management Computing Hiring/Firing Regulations Network Congestion Small Business Vulnerabilities Sports Managed IT services Politics VoIP Favorites Chatbots Administrator Cyberattacks Employer-Employee Relationship Telephone Systems IBM Compliance Financial Virtual Assistant Black Market Productivity Document Management Mobility Virus Settings Gadget Automobile Software Notifications Disaster Resistance Lenovo Point of Sale Hard Drives App Voice over Internet Protocol Law Enforcement Botnet Smartphone Managing Stress Monitoring Managed IT Chromebook Statistics Save Money IT Budget Remote Monitoring and Management HIPAA IT Management Mobile Office Remote Worker Applications Features Computer Repair Social Media Halloween Application Server Management Consumers The Internet of Things Net Neutrality Word Taxes Analyitcs Cameras Specifications Wasting Time Tip of the Week Staffing Instant Messaging Knowledge PowerPoint IT Services Processors Documents Competition eWaste Backups WPA3 Server Vendor Management Consulting Virtualization Save Time Managed Service Flexibility Cookies BYOD Relocation Budget Human Error Refrigeration Servers Internet Travel Display Tech Terms Procurement Upgrade Two-factor Authentication Hard Disk Drive Office Upgrades Uninterrupted Power Supply Mobile Computing Cyber Monday Business Owner Safety 3D Printing Business Computing Writing Geography Zero-Day Threat Scary Stories Information Passwords Search E-Commerce Solid State Drive Risk Management Experience Break Fix Running Cable Piracy

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code