Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nanotechnology Holds the Key to Doubling Computing Power

b2ap3_thumbnail_ibm_processor_400.jpgEarly in July, IBM announced that they have developed an ultra-dense computer chip that has roughly four times the computing capacity of today’s most powerful chips. These prototype chips, and ones they will develop to fuel computing into the next decade and beyond, are the result of the evolution of 21st century informatics.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

How To Touchscreen Business Management Humor Mirgation Hiring/Firing Microsoft Android Business Technology Private Cloud Language Disaster Telephony Wireless Technology Network Security Smartphone Phishing Cost Management Internet Exlporer Cameras Patch Management IT solutions Licensing Mobile Devices Smart Tech Cortana Bluetooth Google Drive Time Management Public Speaking Relocation How To Monitors Analyitcs Microsoft Excel Remote Computing Printer Paperless Office Tech Support MSP Regulations Experience Computing Infrastructure Machine Learning Remote Monitoring Windows 10 OneNote Operating System Programming Antivirus Personal Information Cloud Superfish Techology Windows 10 Virus Wi-Fi WannaCry Backup and Disaster Recovery Management VPN Refrigeration Operations Telephone Systems Money Human Error Windows 8 Staffing Google Wallet Data Recovery Theft Hackers Alt Codes Point of Sale VoIP Running Cable Fun Corporate Profile Software as a Service Information Technology Sync IT Management Virtual Private Network GPS Trending CCTV The Internet of Things History Statistics Managed IT services Maintenance Smartphones Virtual Desktop Address Undo Office Fraud PDF Search iPhone RMM Business Computing Monitoring 3D Printing Nanotechnology Procurement Chrome Mail Merge Meetings Managed IT IT Consulting Cabling Tip of the Week Printing Managing Stress Unified Threat Management Retail Data storage Health Instant Messaging Mobile Assessment Gadgets Shortcut Internet Storage Drones Data Breach Facebook Hotspot Electronic Health Records Remote Monitoring and Management SaaS Disaster Recovery Vulnerability Halloween Electronic Medical Records Cache Collaboration Redundancy Server Management Healthcare IT Budget Communication Mobile Computing Training Entrepreneur Budget User Tips Lenovo eWaste Ransomware Going Green Google Apps Best Practices Consultation Features Cables E-Commerce Authentication Managed Service Provider IT Support Samsung Recovery Virtual Reality Digital Signature Net Neutrality Wearable Technology Flexibility Safety Marketing WPA3 Read Only BDR Mouse Vulnerabilities Big Data Hacking Test Staff Troubleshooting Mobile Office IT Consultant Business Continuity Managed Service Favorites Tablet Malware Computer Care USB Downtime Hosted Solution Digital Technology Bookmarks Information Cyber Monday Finance Files Software Tips Employees Computer Repair Phone System Data Warehousing Network IoT Robot Productivity Word 5G communications Company Culture Notifications Cryptocurrency Privacy Botnet HIPAA Asset Tracking Mobile Security Distributed Denial of Service Tracking IP Address Saving Time Employer-Employee Relationship Network Congestion Crowdsourcing Modem Deep Learning Infrastructure Workplace Tips Fleet Tracking Legislation Hacker Social Engineering Unified Threat Management Hacks Holiday Data Backup Webcam Travel Black Market Wires Laptop Mobile Device Managment Remote Workers Customer Service Politics Router Star Wars Content Filtering Technology Laws Connectivity Technology Tips ROI Wireless Writing PowerPoint Competition Recycling Risk Management Conferencing Computing Comparison Domains Knowledge Smart Technology Analytics Processors IT service Cookies Data Spyware Email Consulting Emoji Data Management Security Cameras Office 365 Mobile Device Social Networking Government Cloud Computing Unsupported Software Tech Term Gmail Google Docs Two-factor Authentication Apple Cybersecurity Sports Outsourced IT Dark Web Productivity Alert Browser Bring Your Own Device File Sharing Permission Artificial Intelligence Tip of the week Co-managed IT Legal Business Intelligence VoIP Development Mobility Current Events Computers Bitcoin Disaster Resistance Hosted Solutions WiFi Consumers Alerts Solid State Drive Save Time Hard Drive User Error Scary Stories Compliance Environment Specifications Identity Theft Network Management SharePoint Financial Authorization Screen Reader Security Taxes User Managed Services Provider Virtualization High-Speed Internet Cleaning Dark Data Law Enforcement Uninterrupted Power Supply Google Calendar IBM Passwords Mobile Device Management Enterprise Content Management Innovation Servers Internet of Things Scam Zero-Day Threat Remote Worker Websites Automobile Software Public Cloud Spam Twitter Gadget Lithium-ion Battery Presentation Saving Money App Tech Terms Utility Computing Identities Customer Relationship Management Motion Sickness Encryption G Suite Website Heating/Cooling Office Tips IT Technicians Break Fix Data Security Web Server Display Piracy Outlook Downloads Microsoft Office Update Networking Blockchain Best Practice Motherboard Geography Windows Supercomputer Business Growth Upgrade Application Migration Social Media Black Friday Mobile Data CIO End of Support Upgrades Password Save Money Data loss Intranet Employee-Employer Relationship Cybercrime Business Owner Business Hardware Backups Users Hard Disk Drive Cooperation Unified Communications BYOD Firefox Automation Server Quick Tips Administrator Avoiding Downtime Documents IT Support Chromebook Administration Proactive IT Applications Efficiency Digital Payment Physical Security Chatbots Help Desk Work/Life Balance IT Services Firewall Google Maps Education Proactive YouTube Hard Drives Typing Miscellaneous Access Control Backup Small Business Identity Project Management Social Error Settings Managed IT Service Enterprise Resource Planning LiFi Cyberattacks Document Management Augmented Reality Multi-Factor Security Permissions Buisness Computer Managed IT Services Vendor Management Bandwidth

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...