Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Things That Go Bump in the Server Closet

b2ap3_thumbnail_spooky_technology_400.jpgHalloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodcurdling screams are enough to make you want to run and hide. Yet, there’s one sound that’s the most terrifying of them all, and it’s coming from your server room!

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

IT Technicians Net Neutrality Disaster Resistance Wireless Technology Flexibility Computer Care Human Error Mobility Refrigeration Project Management Processors Office Tips Modem Screen Reader Google Wallet Nanotechnology Tech Term Security Cameras Regulations Corporate Profile IT Budget Search Alert Saving Time Physical Security OneNote Cookies Relocation Robot Workplace Tips RMM Virtual Reality Cooperation Augmented Reality Finance Upgrade Gmail Monitoring Migration Heating/Cooling VoIP Smart Technology Network Congestion Conferencing Vulnerability IP Address Hacking Lenovo Hiring/Firing Firefox IoT Features Quick Tips Outsourced IT Network Security ROI Chatbots Bandwidth IT service Infrastructure Display BYOD Supercomputer IT Support Communication Star Wars Error User Tips Presentation Application E-Commerce Virtualization Cables 3D Printing SaaS Wireless Update Remote Workers Buisness Administrator Budget Spyware Public Cloud Business Intelligence G Suite VoIP Training Address Authorization Google File Sharing Outlook Business Management Virus Security VPN Windows 10 Miscellaneous Apple Encryption Cyberattacks Office Wearable Technology Wires Websites Microsoft Experience Mobile Security Cloud Computing Retail Facebook Time Management Document Management Applications Data Recovery Disaster Website Marketing Downloads Best Practices Utility Computing Shortcut Tracking Sync iPhone Entrepreneur Best Practice Comparison Consumers End of Support Licensing IT Management Firewall Black Market Machine Learning Risk Management IBM Apps Google Maps Politics eWaste Wi-Fi Permissions Server LiFi Word Cleaning GPS Redundancy Automation Network Social Networking WiFi Solid State Drive Bluetooth Hacker Specifications Printing Google Docs Office 365 Business Computing Legislation Virtual Private Network SharePoint Patch Management Computer Repair Proactive IT Hackers Law Enforcement Instant Messaging Mobile Devices Efficiency Enterprise Resource Planning Network Management Test PowerPoint Employees Innovation Knowledge Router Dark Web Favorites Information How To History Software as a Service Read Only Recovery Documents Windows 8 Theft Automobile Superfish Computing Infrastructure Scary Stories Smartphone Deep Learning Analyitcs Employee-Employer Relationship Drones 5G Humor Avoiding Downtime Internet Alt Codes Smartphones Geography Two-factor Authentication Privacy Antivirus Cabling Remote Computing Paperless Office User Error Authentication Identity Mobile Operating System Mobile Device IT Consulting Zero-Day Threat User Black Friday Connectivity Staffing Consulting Managed IT Bring Your Own Device Information Technology Techology PDF Cryptocurrency Managing Stress Hosted Solution WannaCry Statistics Laptop Break Fix Storage Domains Customer Service Managed Service Provider Financial Technology Tips Computers Government Computing Spam Chromebook Scam Sports Motherboard Undo Productivity Business Owner High-Speed Internet communications Tip of the Week Disaster Recovery Business Continuity Writing Electronic Medical Records Social Engineering Dark Data Data Management Gadget Holiday Blockchain Taxes Health Malware Ransomware Data Warehousing Backup Files Save Money Piracy Android Halloween Public Speaking Unsupported Software HIPAA Tablet Managed IT services Typing Virtual Desktop Hardware Big Data Backup and Disaster Recovery Unified Threat Management Current Events Cybercrime Printer Touchscreen Phishing Microsoft Excel Cyber Monday Unified Communications Fleet Tracking Mouse IT Support Environment Data loss Windows 10 Staff Education Point of Sale Analytics Bookmarks YouTube Programming Mobile Data Management Email Cloud Data storage CIO Safety Money The Internet of Things Legal Hard Disk Drive BDR Productivity Tip of the week Administration Recycling Passwords Work/Life Balance Multi-Factor Security Saving Money Google Calendar Troubleshooting Computer Smart Tech Trending Going Green Cache Cost Management Hotspot Software Tips Server Management Hosted Solutions Tech Terms Windows Proactive Digital Meetings Mobile Device Managment Mail Merge Mobile Office Phone System MSP Assessment Social Media Artificial Intelligence Emoji Mobile Computing Notifications Fraud Competition App Enterprise Content Management Unified Threat Management USB Identities IT Services Maintenance Hard Drive Alerts Language Cybersecurity Identity Theft Telephony Monitors Save Time WPA3 CCTV Cortana Password Cameras Chrome Consultation Mirgation Samsung Motion Sickness Managed Services Provider Business Growth Data Breach Permission Digital Payment Intranet Upgrades Compliance Content Filtering Browser Web Server Mobile Device Management Uninterrupted Power Supply Personal Information Healthcare Asset Tracking Remote Monitoring and Management Remote Worker Access Control Travel Technology Data Data Backup IT solutions Co-managed IT Vulnerabilities Development Operations Botnet Vendor Management Data Security Settings Fun Business Tech Support Telephone Systems Customer Relationship Management Downtime Internet Exlporer Remote Monitoring Electronic Health Records Microsoft Office Distributed Denial of Service Running Cable Small Business Managed Service Networking Procurement Technology Laws Private Cloud Business Technology Webcam Twitter Hacks Google Drive Bitcoin How To Company Culture Hard Drives Managed IT Services Servers Lithium-ion Battery Employer-Employee Relationship Users Digital Signature Gadgets Backups Internet of Things Crowdsourcing Social Help Desk Collaboration Software IT Consultant Managed IT Service

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...