Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Holiday Tech Gifts for 2014

b2ap3_thumbnail_2014_gifts_400.jpgThe holidays are again upon us and if you are looking for the perfect gift for your favorite business professional, you don’t have to look too far. There are more consumer electronics available today than ever before, and most of them have some sort of novelty attached to them. We have made a list of four gifts that are not only cool, they serve a practical purpose and will probably avoid being re-gifted or recycled.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cookies Windows Vulnerabilities Business Computing Twitter Password Electronic Medical Records Touchscreen Hotspot Writing Alert Microsoft Excel Notes Data Recovery Technology Tips Consulting Samsung Point of Sale Notifications Downtime Information Conferencing Settings Compliance Bring Your Own Device Nanotechnology Environment Remote Workers Relocation RMM Hackers Shortcut Mobile Office Vulnerability Work/Life Balance Best Practices Virus Cryptocurrency Deep Learning Mobile Device Management Mobile Cloud Virtual Assistant Break Fix IP Address Superfish Data Security Hacks Mobile Devices Remote Monitoring and Management Office 365 Travel Mobile Device Chrome Browser iPhone Patch Management Tip of the Week Digital Signature Router Server Management Healthcare Backup and Disaster Recovery Telephone Systems Current Events VoIP Identity Theft Identities Unified Communications Managing Stress Customer Service Unified Threat Management Security Cameras ROI Hard Disk Drive Bitcoin Buisness Telephony Server Computing Big Data Refrigeration User Tips Supercomputer Outlook Crowdsourcing Recovery Windows 8 Employer-Employee Relationship Dark Web Google Maps Legislation Corporate Profile Augmented Reality Personal Information Zero-Day Threat Enterprise Resource Planning Company Culture Alt Codes Web Server Cyber Monday Internet Exlporer History Computers Access Control Office Tips Monitoring LiFi Training Virtual Desktop Antivirus Development Productivity Motion Sickness Finance Software as a Service Social Engineering Specifications Mirgation IT Management Managed Services Provider Internet Tablet Sports File Sharing Solid State Drive Remote Monitoring Humor Fleet Tracking Software Tips Money Regulations Taxes Presentation Cybersecurity Business Technology Privacy Chatbots Apps Sync Cables Software Halloween User Error Bandwidth Techology Staffing YouTube Managed Service Provider Quick Tips Typing Network Congestion Managed IT Service BDR Going Green Proactive IT Google Docs Tech Term Cyberattacks IT Support Help Desk Virtualization Procurement User Remote Worker Miscellaneous Test Processors Staff WiFi BYOD Communication Smartphones Asset Tracking Printing Monitors Cabling Uninterrupted Power Supply Wasting Time IT Consulting Mobility Instant Messaging Save Money Business Owner Social CCTV Save Time Hacking Business Intelligence Firewall Trending Document Management Legal Smartphone Cache Hiring/Firing Network Management Hacker Enterprise Content Management Proactive GPS Professional Services Saving Time Digital Payment Holiday Running Cable Mobile Security Bookmarks Marketing IBM Business Growth Lithium-ion Battery Piracy PowerPoint Emoji Business G Suite Administration USB Heating/Cooling Documents IT service Management Recycling Customer Relationship Management Gmail Google Calendar 3D Printing Government Authentication Android Collaboration Assessment Two-factor Authentication Utility Computing Disaster Recovery Printer Websites Black Market Managed Service MSP Spyware Information Technology Malware Public Speaking Star Wars Ransomware Favorites How To Undo Technology Laws Small Business Wires Entrepreneur Physical Security Data Warehousing Firefox How To Screen Reader Connectivity Meetings Best Practice Redundancy Co-managed IT Managed IT services Politics Mobile Data Chromebook Public Cloud Files Email Cortana Backups Tech Terms Downloads Content Filtering Blockchain Servers Motherboard Website Facebook Scary Stories Hosted Solution Multi-Factor Security Internet of Things Cost Management End of Support SharePoint Upgrade Troubleshooting Mobile Computing Hardware Employee-Employer Relationship Operating System Mobile Device Managment VoIP Display Electronic Health Records Competition Flexibility Distributed Denial of Service Financial 5G Mouse Botnet Fun Error Data Management Machine Learning IT Technicians Permissions App IT Budget Application Encryption Computer Care Users The Internet of Things Administrator Network Security Consultation CIO Human Error Phishing Word Workplace Tips Search Security Dark Data E-Commerce Voice over Internet Protocol WannaCry Safety Migration Wi-Fi Automobile HIPAA Google Artificial Intelligence communications Passwords Networking Read Only Analyitcs Fraud Alerts Identity Computer Repair Cybercrime Computing Infrastructure Hosted Solutions Disaster IT Consultant Time Management Data loss Google Wallet Google Drive Upgrades Windows 10 Gadget Analytics Data Digital Network Risk Management Paperless Office Maintenance Wireless Technology Black Friday Geography Applications Windows 7 Private Cloud Cloud Computing Managed IT Services Update Cooperation Social Media eWaste Lenovo Features Outsourced IT Managed IT Data Breach VPN Modem Budget Cleaning Apple IT Support Storage Vendor Management Bluetooth Knowledge Laptop Tracking Tech Support Programming Technology Windows 10 Address Office Cameras Efficiency Comparison Gadgets OneNote IoT Education Employees Virtual Private Network Law Enforcement Authorization SaaS Intranet WPA3 Phone System Data storage Wireless Saving Money Spam Unified Threat Management Smart Technology Mail Merge Language Microsoft Drones Social Networking Remote Computing Theft Wearable Technology Scam Virtual Reality Net Neutrality Robot Microsoft Office Hard Drive Tip of the week Data Backup Domains Webcam Automation PDF Experience Disaster Resistance Hard Drives Health Consumers Business Management Productivity Operations Retail Avoiding Downtime Statistics IT Services Smart Tech Permission Business Continuity Project Management Database Licensing Infrastructure Computer IT solutions High-Speed Internet Unsupported Software Innovation Backup

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code