Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Think Twice about Throwing Away Working Technology

b2ap3_thumbnail_ewaste_becoming_a_major_issue_400.jpgWhen it comes to getting new technology, it’s typical to spend a significant amount of time agonizing over which product is the best. All the while, little regard is given to the disposal of one’s old tech, which often gets tossed in the trash. You may not have realized it, but haphazardly disposing of our old technology is wreaking havoc on the environment.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Data Breach Staff Chromebook Cooperation Information Technology Legislation Augmented Reality Settings MSP Work/Life Balance Enterprise Resource Planning Software Tips Mirgation Digital Payment Bring Your Own Device Smartphone Computer Repair Crowdsourcing Flexibility Read Only Business Continuity Antivirus Company Culture USB Nanotechnology IoT Computer Care Favorites Consulting WiFi Managed IT services Taxes Cost Management Training Unified Threat Management Geography Customer Relationship Management User Recycling Scam Small Business Digital Business Technology Google Docs SaaS How To IT Consultant Corporate Profile Trending Co-managed IT Managed IT Windows 8 Paperless Office Writing Meetings Health Apple Network Security Theft Bandwidth Humor Mouse Motherboard Downloads Virus Cameras Mobility Artificial Intelligence Comparison Politics Current Events Net Neutrality Knowledge communications WPA3 Hard Disk Drive Utility Computing Permissions Wireless Technology Experience Miscellaneous Human Error Chrome Techology Office Tips Bluetooth Help Desk Travel Vendor Management Tablet Fun Social Engineering Innovation SharePoint Cortana Data storage Computing Public Cloud Statistics Analytics Going Green Employees Outsourced IT Multi-Factor Security Programming Firewall Backup and Disaster Recovery Google Drive Servers Electronic Medical Records Website Data Management Downtime Save Time Managed IT Service Vulnerability Modem Hosted Solution Marketing Outlook Email Licensing Sync Social Media Budget Law Enforcement Lithium-ion Battery Domains Automation Remote Monitoring Technology Laws Machine Learning Automobile Remote Monitoring and Management Risk Management Workplace Tips Users Computers Monitors Wi-Fi Data Recovery Cybersecurity Presentation PDF IT Budget GPS Assessment Collaboration Features Samsung Tech Terms OneNote Electronic Health Records Undo IT Consulting Printer IT service Fraud High-Speed Internet Address Managed Services Provider Managed IT Services Managed Service Smart Tech Word Cabling Google Calendar Conferencing Administration Big Data Data Test Motion Sickness Botnet YouTube IT Services Ransomware Development Safety Staffing Hacks Patch Management Data Warehousing Websites Typing IT Management Identities Telephony Hard Drive Password Management Office ROI Virtual Private Network Cables Best Practices Entrepreneur Document Management Tip of the week Emoji App Shortcut G Suite Halloween Recovery Infrastructure WannaCry User Tips Redundancy Spyware Network Management Hiring/Firing Spam Office 365 Identity File Sharing Business Management Proactive Access Control Black Friday Internet Exlporer IT solutions Smart Technology Employee-Employer Relationship Screen Reader 3D Printing Encryption Hacker Internet of Things Disaster Personal Information Tech Term Disaster Recovery Bookmarks Computing Infrastructure Google Maps Education Retail Saving Time Virtual Reality Gmail Cybercrime Holiday Blockchain E-Commerce Project Management Application BYOD Regulations Employer-Employee Relationship Computer Wearable Technology Security Cameras Wires Smartphones Alert Managing Stress Data Backup Webcam Hosted Solutions Hackers Mail Merge Saving Money Legal Asset Tracking Mobile Device Piracy End of Support Deep Learning Quick Tips Telephone Systems Unified Threat Management Hacking Printing Language Refrigeration Analyitcs Tech Support Migration Mobile Solid State Drive Cloud Financial Android Social Communication Permission Files Time Management Cyberattacks Point of Sale Software Unified Communications Gadget Social Networking Public Speaking Unsupported Software Wireless Two-factor Authentication VPN Black Market Remote Worker Information Authorization Competition Mobile Data PowerPoint Remote Workers Google Wallet Intranet Hotspot iPhone Best Practice Networking Hard Drives 5G Business Windows 10 Operations Chatbots Dark Web Virtual Desktop Alt Codes Identity Theft Network Congestion Bitcoin IT Technicians IBM BDR Firefox Internet Remote Computing Authentication Error Windows 10 Cyber Monday Troubleshooting Procurement Mobile Security Microsoft RMM Malware Productivity Laptop Technology Tips Phishing Enterprise Content Management Tip of the Week Specifications CCTV Mobile Office Connectivity Backup Maintenance Drones Microsoft Office Operating System IT Support Twitter Hardware Mobile Devices Mobile Device Management Supercomputer Money IP Address Upgrades Applications Lenovo Digital Signature Search Web Server Environment Technology Processors Fleet Tracking Business Computing Server Management Buisness Productivity Running Cable Notifications Sports Consultation Touchscreen Facebook Tracking Display Consumers Cloud Computing Data Security VoIP Heating/Cooling Gadgets Business Owner Efficiency Documents Cleaning Zero-Day Threat Mobile Device Managment IT Support How To Network VoIP CIO Mobile Computing Cookies Finance Virtualization Business Intelligence Backups HIPAA Google Healthcare Upgrade Avoiding Downtime Alerts Microsoft Excel Passwords Compliance eWaste Customer Service Vulnerabilities User Error Robot Disaster Resistance Data loss Star Wars Superfish Server Monitoring Cryptocurrency LiFi Instant Messaging Router Relocation Managed Service Provider Administrator History Cache Break Fix Browser Private Cloud Dark Data Storage Physical Security Save Money Scary Stories The Internet of Things Update Privacy Proactive IT Software as a Service Phone System Content Filtering Government Apps Business Growth Windows Distributed Denial of Service Uninterrupted Power Supply Security

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code