Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Ways Millennials Can Reverse-Mentor Your Staff

b2ap3_thumbnail_learn_from_millenials_400.jpgMillennials may be looked down upon in the average workplace for a number of reasons that are entirely subjective, whether it be that they’re “spoiled rotten” or “just plain rude.” But in today’s workplace based around technology, millennials have a huge advantage, and have even given long-time CIOs a run for their money when it comes to technology management.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Small Business Technology Laws Paperless Office Application Google Drive Facebook IP Address Tech Support Collaboration Content Filtering Presentation Government IT Support Current Events Windows 7 Notifications Specifications Chromebook Flexibility Database Project Management Uninterrupted Power Supply Gadget Cables Bring Your Own Device Virtualization Company Culture Shortcut Remote Monitoring and Management Unified Threat Management IoT Windows 10 Social Networking Identity Theft Google Wallet Update Cache Finance Cloud Cybercrime 3D Printing High-Speed Internet Cyberattacks ROI SharePoint Monitors YouTube Authorization Productivity Drones Identity Privacy Unified Threat Management Managed Services Provider Chatbots Chrome Enterprise Resource Planning Analytics Cost Management Cabling Star Wars Deep Learning Processors Scary Stories Website Internet Taxes Administrator Gadgets Networking Corporate Profile Digital Payment Disaster How To Virtual Reality Storage Information Technology Maintenance Solid State Drive Antivirus Remote Monitoring Computers Writing Communication Software Tips Digital Windows 10 PowerPoint Google Microsoft Excel Business Owner VPN IT Consulting Network Security Apps Bluetooth Telephony Multi-Factor Security Downtime Best Practice Web Server OneNote Printing Superfish Saving Time Enterprise Content Management Managed IT Service Safety Mobile Security Training Spyware End of Support Dark Data Outlook Managed Service Botnet Avoiding Downtime Computer Theft Notes SaaS Troubleshooting Favorites Network Congestion IT Support Smartphones Twitter Upgrades Telephone Systems Consumers USB Proactive IT Quick Tips Big Data Virtual Assistant Websites Operating System Business Mobile Device Going Green Instant Messaging Staff Business Continuity Dark Web Voice over Internet Protocol Virtual Private Network Hard Drive Healthcare Passwords Business Intelligence Licensing Smart Tech Settings Data Security Undo Authentication Travel Cortana File Sharing Internet of Things Hiring/Firing Google Maps Hard Disk Drive Business Management Mirgation Administration Managing Stress Retail Tablet Cybersecurity Wireless Managed IT Services WPA3 VoIP Machine Learning Cyber Monday CIO Co-managed IT Windows 8 Applications Office Tips Regulations Laptop Technology Samsung VoIP Email Touchscreen Monitoring Outsourced IT Wasting Time Word Utility Computing Hotspot Managed IT services Mouse Trending IT solutions Test Operations Phone System Mobile Device Managment communications Hosted Solution Webcam Computing Infrastructure Wi-Fi Black Friday Smart Technology Competition Tip of the Week Mail Merge Redundancy Miscellaneous Language Compliance Efficiency Automobile Business Growth Environment IT Technicians Remote Workers IT service Server Management Experience Backup and Disaster Recovery Fleet Tracking Point of Sale Wearable Technology Relocation Emoji Bandwidth IBM Hosted Solutions Downloads Tech Terms Public Cloud Access Control Running Cable Data Breach Security Router Help Desk Features User eWaste LiFi Typing Blockchain Save Time Crowdsourcing Supercomputer Asset Tracking Best Practices Techology Sync Heating/Cooling IT Budget Data Recovery Disaster Recovery Backups Permission Mobile Data Virus Two-factor Authentication Server Buisness The Internet of Things User Error Refrigeration Data storage Physical Security Infrastructure Users Microsoft Office Cookies Comparison 5G Hard Drives Mobile Smartphone Data Warehousing Password Document Management User Tips Lenovo Modem Virtual Desktop Hackers Money Search Identities BYOD Conferencing WiFi Productivity Managed IT Computing Cooperation Wires Business Technology Vulnerabilities Internet Exlporer Digital Signature Legislation Cloud Computing Halloween Nanotechnology Error Hacks Printer Statistics Computer Care Mobile Devices Migration MSP Consultation Sports Computer Repair Social Media Read Only Geography Software as a Service Save Money Motherboard Alerts Hardware Connectivity Business Computing Phishing Encryption History Education Programming Managed Service Provider Remote Computing Recovery Gmail Saving Money Data Google Docs Bookmarks Analyitcs Social Engineering Documents Firefox Tip of the week Piracy Security Cameras Hacker Health Software Electronic Medical Records Tracking Zero-Day Threat Management Servers Intranet Data Backup Procurement Mobile Office Humor Cryptocurrency Ransomware Display Personal Information Microsoft Office 365 Apple Net Neutrality Politics Social Fraud Android IT Services Break Fix Bitcoin Cameras HIPAA How To Distributed Denial of Service Employees CCTV iPhone App Firewall Patch Management Address Innovation Meetings Proactive WannaCry Risk Management Human Error Backup Development Electronic Health Records G Suite Technology Tips Malware Private Cloud Google Calendar Vulnerability Customer Service Knowledge Workplace Tips Upgrade Black Market Mobile Device Management Unsupported Software Work/Life Balance Financial Augmented Reality Time Management Hacking Domains Data Management Network Cleaning Disaster Resistance Alert Employer-Employee Relationship Professional Services Tech Term Scam Unified Communications IT Management Data loss Vendor Management Network Management GPS Customer Relationship Management Budget Information Holiday Employee-Employer Relationship Entrepreneur Spam Lithium-ion Battery Automation Marketing RMM Legal Staffing Assessment Wireless Technology Mobility Alt Codes Recycling Mobile Computing PDF Office Public Speaking Robot Permissions Motion Sickness BDR Screen Reader Fun Remote Worker Browser Files Windows Artificial Intelligence IT Consultant Law Enforcement E-Commerce Consulting

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...