Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Cloud Revolution: We’ve Seen This Before

The Cloud Revolution: We’ve Seen This Before

As technologies emerge and trends change, organizations face massive paradigm shifts involving the tools and methods they use to conduct business. Right now, we’re in the middle of one of the most significant shifts in decades; more and more businesses are relying on cloud computing.

Continue reading
0 Comments

Are You Using Technology Fit for a Museum?

b2ap3_thumbnail_old_tech_400_20141209-163337_1.jpgWhat’s the technology in your office like? There’s a pretty good chance that at least some of the equipment you’re using may be obsolete. To find out if you’re using any obsolete technologies, let’s take a stroll down the Museum of Obsolete Objects and see what they’ve got on display.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Relocation Processors Infrastructure Supercomputer Going Green Solid State Drive Cabling Google Wallet Server Management Webcam Printer Business Continuity Computer Care User Wi-Fi Motion Sickness Hosted Solution Alerts Lithium-ion Battery Domains Cortana Star Wars Digital Signature Artificial Intelligence Smart Technology Ransomware Safety Uninterrupted Power Supply Access Control Mobile Office Virtual Reality Electronic Medical Records Cooperation Tracking Meetings Mobility Remote Monitoring Search Business Intelligence Instant Messaging G Suite Current Events Notifications High-Speed Internet Hard Drives Tech Term Piracy Spam Microsoft Black Friday Social Software as a Service Bookmarks Fun Information Chrome Deep Learning Mobile Device Education Information Technology Smartphone Saving Money Cybercrime Hotspot Shortcut Virtual Desktop Password Printing Business Growth Email Touchscreen Lenovo BYOD Language WPA3 Google Drive Google Google Calendar Mobile Devices Data loss Typing HIPAA Chromebook Risk Management The Internet of Things Disaster Sports Test Maintenance YouTube Telephony Users Gadget Bitcoin Computers Staffing Tech Terms Undo Digital Payment Virus Experience VoIP Authorization Drones Hiring/Firing Gmail Remote Monitoring and Management Spyware Legal IT Consulting WannaCry Permissions ROI Best Practice Display Private Cloud End of Support Malware Screen Reader Privacy Identity Buisness Machine Learning Firefox Recycling Security Augmented Reality Help Desk Outlook Data Management Social Networking Productivity Samsung Virtual Private Network App Training Software Tips Compliance Proactive Windows RMM Crowdsourcing Administrator Innovation Network Congestion Operating System Business Owner Consulting Settings Browser Entrepreneur Encryption Bandwidth Upgrades Halloween Big Data Social Engineering Staff Office Tips Fraud Data Breach Specifications Programming Gadgets Identities Humor Robot Backups Hacks Google Docs Dark Web Saving Time Cameras Save Time Paperless Office Customer Relationship Management Downloads Cryptocurrency Work/Life Balance Storage Personal Information Knowledge Productivity User Tips Documents Financial Disaster Resistance Wearable Technology VPN Redundancy Data Recovery Office 365 Mobile Device Managment Cost Management Phone System Bring Your Own Device Application Passwords PDF Alert Cyberattacks Router Utility Computing BDR Outsourced IT Mail Merge Office Read Only Network Management Data Backup Asset Tracking Marketing Taxes Enterprise Resource Planning Vendor Management Enterprise Content Management Technology Tips Politics Analytics SaaS Managed IT services Theft IT Technicians Wireless Technology Point of Sale Travel Tech Support Managed IT Services IT Services Technology Co-managed IT IP Address IT Consultant Public Speaking Holiday Remote Workers Procurement Server Cables CIO Miscellaneous Dark Data IoT IT service Bluetooth Business Technology Twitter Cleaning Data Security Data storage Websites Sync Vulnerability Network Best Practices Monitoring Company Culture Law Enforcement Document Management 5G Security Cameras Servers Windows 8 Identity Theft PowerPoint Tip of the Week Hacker Virtualization Error IT Management Licensing Authentication Nanotechnology Unified Threat Management Budget GPS How To Automation Finance Software Managed Service Provider Content Filtering Google Maps Fleet Tracking IT Support Troubleshooting User Error Time Management Firewall Emoji Analyitcs WiFi Hackers Downtime Writing Patch Management Computer Hosted Solutions Migration Hardware Monitors Employer-Employee Relationship Government Disaster Recovery Avoiding Downtime Chatbots Legislation Cache Cybersecurity Electronic Health Records Telephone Systems Features Network Security Backup Botnet Smart Tech Managed IT Recovery Hard Disk Drive Mirgation Retail Small Business iPhone Applications Vulnerabilities Address Consumers Techology communications Apple Automobile 3D Printing Modem Mobile Computing IT solutions Managed Services Provider Managing Stress Business File Sharing Net Neutrality Internet Exlporer Antivirus Social Media Tip of the week Environment Data Warehousing Superfish Unified Threat Management E-Commerce Human Error Comparison Communication eWaste Computing Hard Drive Blockchain IT Support Tablet Remote Computing Statistics Competition Backup and Disaster Recovery Business Management Website Quick Tips How To Android Phishing Managed Service Operations Health Smartphones Laptop Zero-Day Threat Administration USB History Connectivity Save Money Employee-Employer Relationship VoIP IBM Unsupported Software Internet of Things Running Cable Networking Windows 10 Scam Scary Stories Mobile Data LiFi Money Internet Consultation Facebook Apps Intranet CCTV Favorites Two-factor Authentication Healthcare IT Budget Remote Worker Geography Customer Service Management Unified Communications Multi-Factor Security Corporate Profile Physical Security Web Server Computer Repair Collaboration Digital Public Cloud Cloud Computing Update Heating/Cooling Conferencing Cookies Wires Managed IT Service Upgrade Mobile OneNote Workplace Tips Flexibility Cyber Monday Distributed Denial of Service Data Break Fix Project Management Mouse SharePoint Permission Files Microsoft Excel Computing Infrastructure Refrigeration Proactive IT Trending Alt Codes Mobile Device Management Business Computing Wireless Regulations Presentation Windows 10 MSP Technology Laws Employees Motherboard Cloud Efficiency Hacking Microsoft Office Word Mobile Security Black Market Assessment Development

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code