Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What’s the Benefit of Using Solid State Drives vs. Hard Disk Drives?

b2ap3_thumbnail_HDDSSD_400.jpgWhen it comes to storing data locally on your organization’s workstations, you have a couple of options. There are solid state drives and hard disk drives, but the average user isn’t tech-savvy enough to understand the difference between the two. Regardless of what kinds of devices you use for your business, you should be aware of how they work and what you can expect from them.

Continue reading

5 Signs Your Hard Drive is About to Fail

b2ap3_thumbnail_hard_drive_failure_400.jpgWe all know the fleeting moment of fear as a computer slows to a grinding halt, taking forever to perform the most basic of tasks. At the same time, we also know the relief of when you find out there’s nothing wrong with your PC. Still, what if that relief never comes? What if you’re dealing with one of the most dangerous computer issues of all: a hard drive crash?

Continue reading

How to Properly Store a Hard Drive

b2ap3_thumbnail_frozen_hard_drive_400.jpgWhat’s the best way to preserve your important files for years to come? Questions like this are being asked more frequently in our data-driven society. Here are some best practices when it comes to long-term data storage.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Passwords Managed IT services Office Tips Techology Encryption Enterprise Resource Planning Taxes Apps Antivirus Public Cloud Cybersecurity Botnet Healthcare Halloween Social Media Managed Services Provider Telephony Troubleshooting Personal Information Application Experience Windows Google Wallet Hackers Tablet Technology Laws Risk Management Permissions Bitcoin Hacks Shortcut Project Management Employer-Employee Relationship Data Management User Emoji Favorites Instant Messaging IBM Notifications Alert Software Tips Bluetooth Theft Lithium-ion Battery Mail Merge Language RMM Cabling Marketing Hacker Identity Theft OneNote Best Practice Mobile Device Managment Bookmarks Scary Stories Legislation HIPAA Training Meetings Intranet Processors Mobile Computing Save Time Business Intelligence Hosted Solutions Asset Tracking Software as a Service Virtual Reality Presentation SaaS Google Docs Deep Learning Big Data Work/Life Balance Windows 10 Co-managed IT Computers Unified Threat Management Data Security Running Cable IT Support Computing Infrastructure Office 365 Upgrades BDR Wireless Technology Cyberattacks Social Networking Analytics Chatbots Security Cameras Automation Conferencing Tech Terms Hard Disk Drive Mobile Device Management Word Automobile Development Unified Threat Management Social Engineering Gadgets Bandwidth Saving Time Sports Customer Relationship Management Budget Technology Cryptocurrency GPS Buisness Time Management Going Green Mirgation WannaCry Firefox Tech Support VoIP VoIP Hard Drive IT service Samsung Technology Tips Disaster Undo Cache Entrepreneur Hotspot Writing Crowdsourcing Router Outlook Cyber Monday Mobile Security Zero-Day Threat Gadget Remote Monitoring Net Neutrality Software Mobile Data Smart Technology Office Data storage Wi-Fi Company Culture Identities Test Sync Break Fix Money Infrastructure Communication Data Virtual Desktop Social User Tips Users Cameras Assessment Update User Error Avoiding Downtime Gmail IT Budget Government Fraud Disaster Recovery Virtualization Point of Sale Star Wars Managed Service Provider Business Growth Nanotechnology Phishing Vulnerability Private Cloud Privacy Black Market Health Efficiency Migration Managed IT Monitors Current Events Windows 10 Webcam Backup Business Management Vulnerabilities Holiday Multi-Factor Security Comparison Cables Geography Laptop Authorization Virus Robot Tracking Internet Computing Telephone Systems Remote Workers Address Unsupported Software Patch Management Servers Travel Android Chrome Disaster Resistance Proactive Server Management Domains VPN Fun Machine Learning Redundancy Innovation Spam Email Search File Sharing Solid State Drive Cortana Digital CCTV Data Breach Downtime Humor Cleaning Regulations Consultation Alerts Touchscreen IT solutions Data loss Two-factor Authentication Mobility Artificial Intelligence Hacking 3D Printing Alt Codes Features Law Enforcement Safety Malware Remote Worker Network Management Browser Business Technology Knowledge Heating/Cooling Specifications Mouse Cybercrime Recovery Mobile Device Cloud Computing Drones Black Friday Websites Information Technology Administration Supercomputer Employees Blockchain IP Address How To PDF Microsoft Office G Suite iPhone Data Recovery Motherboard Consulting Superfish Access Control Managed Service Spyware Miscellaneous Procurement Microsoft Excel Financial Tech Term Retail Recycling Paperless Office Management Wireless Networking Mobile WiFi Electronic Medical Records Windows 8 Collaboration E-Commerce Business Owner Network Data Warehousing Environment IT Services App Customer Service Cloud PowerPoint Best Practices Google Maps Politics Applications Password Employee-Employer Relationship Smartphones Analyitcs Chromebook Managing Stress Public Speaking Workplace Tips IoT Information Google Dark Data Document Management Managed IT Service Flexibility Hard Drives Hardware Security YouTube Productivity Distributed Denial of Service Monitoring Productivity The Internet of Things Electronic Health Records 5G Operating System Internet Exlporer Content Filtering Uninterrupted Power Supply Internet of Things Error Smartphone Proactive IT Identity Physical Security Hosted Solution Utility Computing Relocation USB Saving Money Microsoft Firewall Enterprise Content Management Screen Reader MSP Legal Mobile Office Bring Your Own Device Server Network Security Read Only Scam History Outsourced IT Backups Managed IT Services Network Congestion Hiring/Firing Authentication Remote Monitoring and Management IT Technicians Small Business IT Management Modem Settings Refrigeration Piracy Phone System Documents Compliance Education Mobile Devices Augmented Reality BYOD Consumers Corporate Profile Trending Backup and Disaster Recovery Lenovo Cooperation Twitter Tip of the week WPA3 Permission Maintenance IT Support Storage Staffing eWaste Connectivity Upgrade High-Speed Internet Computer Care Virtual Private Network communications Operations Digital Signature Website Apple Printer ROI Vendor Management Data Backup Motion Sickness Google Drive Computer Finance Typing Statistics Cost Management Downloads Ransomware Human Error Administrator Google Calendar Printing Help Desk Staff Wires Web Server Business Programming IT Consulting CIO Fleet Tracking Smart Tech End of Support Tip of the Week Licensing Save Money Wearable Technology SharePoint LiFi Business Computing Files Display Dark Web Facebook Cookies Unified Communications Competition Remote Computing Business Continuity Digital Payment IT Consultant How To Quick Tips Computer Repair

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...