Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading

Tip of the Week: How to Put the Power Back into Your Laptop’s Battery

b2ap3_thumbnail_laptop_battery_saving_tips_400.jpgA laptop with no power can be a pain, especially when it only lasts a minimal amount of time. Sometimes it feels like you can’t operate at full capacity without leaving your laptop plugged in at all times. Thankfully, you don’t have to suffer from this, and with a little bit of troubleshooting and basic PC maintenance, you can prolong the life of your laptop’s battery significantly.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Address Meetings Two-factor Authentication Assessment Save Time Router Wearable Technology Trending Display Big Data Firewall E-Commerce Notifications Asset Tracking Flexibility Managed Service MSP Shortcut Entrepreneur Paperless Office Digital Signature Buisness Phishing Current Events USB Consultation Business Growth Sports Internet of Things Hard Drive Enterprise Resource Planning Telephony Save Money Company Culture Maintenance Analyitcs Automobile VPN Disaster Procurement Cybercrime Instant Messaging Staffing Test Mobile Office Tech Support Servers Social Media Deep Learning Network Digital Marketing Public Speaking Managed IT Remote Workers Remote Monitoring and Management Productivity Smartphone Relocation Money Security Websites Healthcare Gadgets Mobile Data Downtime Data Management Employees IT Consultant Mobile Computing HIPAA Google Docs Gadget IT Technicians Computer Care Microsoft Office Computer Word Presentation Motion Sickness Avoiding Downtime Wireless Technology Modem Unified Communications Typing Mobile Devices Innovation Cabling History Applications Chatbots Webcam Machine Learning Malware Undo Co-managed IT Identity Apple 3D Printing Holiday Training Augmented Reality User CIO IT service Running Cable Unsupported Software RMM Financial High-Speed Internet Customer Service Proactive IT BDR Emoji Competition Password G Suite Help Desk YouTube Corporate Profile Document Management GPS Cyberattacks Bookmarks Managed IT Services Privacy Computers How To Crowdsourcing Saving Time Software as a Service Cost Management Business Owner Technology Laws Government Remote Computing Risk Management Electronic Medical Records Specifications Permission Unified Threat Management Employer-Employee Relationship Hotspot Travel Mobile WPA3 Hard Disk Drive communications Techology Hardware Tip of the Week File Sharing Managed Service Provider PDF Redundancy Backup and Disaster Recovery Quick Tips Time Management Law Enforcement LiFi Going Green Work/Life Balance Consulting Cleaning Network Management Bitcoin Patch Management Statistics Office Tips Mobile Device Politics Screen Reader Google Calendar Office 365 Processors Disaster Resistance IT solutions WannaCry Cryptocurrency Digital Payment Recycling Theft How To Scam Tip of the week Hosted Solutions OneNote Microsoft Education Ransomware Development Internet Exlporer Drones Information Wi-Fi Management Hard Drives Business Computing Enterprise Content Management Virtual Private Network Tech Terms Computer Repair Robot Hacking Health Hacks Superfish Administrator End of Support Virus Software Tips Saving Money Domains 5G Legislation Mirgation Phone System Microsoft Excel iPhone Migration Backup Printing Cables SharePoint Writing Consumers Social Files Google Maps Disaster Recovery Compliance Efficiency Antivirus Virtual Desktop Operations Artificial Intelligence Supercomputer Fleet Tracking Apps Vendor Management Cache Laptop Google Wallet Permissions Private Cloud Programming IP Address Data storage Physical Security Search Unified Threat Management Small Business Data Security Mobile Security Dark Data WiFi Gmail Data Breach VoIP Business IT Consulting Spam Settings VoIP Application Backups Computing Infrastructure IT Support Server Management Cooperation Network Security Hackers Data Recovery Distributed Denial of Service Cortana Identities eWaste Miscellaneous Heating/Cooling Lenovo Public Cloud Network Congestion Google Drive Content Filtering SaaS Motherboard Google Recovery Troubleshooting Comparison Alerts Black Market Vulnerabilities Social Networking Hosted Solution Language Mobility Knowledge Geography PowerPoint Fun Sync Monitoring Personal Information Solid State Drive Best Practice Bandwidth Smart Technology Experience Tech Term Communication Scary Stories Operating System Touchscreen Smartphones Smart Tech Taxes Facebook Wires Features Utility Computing Windows 10 ROI Proactive Customer Relationship Management Mail Merge Server Environment Browser Regulations Identity Theft Vulnerability Outsourced IT Remote Worker Access Control Best Practices Authorization Passwords Users Business Continuity Read Only Employee-Employer Relationship Legal Data Data loss Staff Halloween Piracy Internet Administration Tracking Refrigeration Cameras Web Server BYOD Retail Windows 8 Managing Stress Data Warehousing Error Information Technology Printer Cookies IT Support Managed IT services Outlook Business Intelligence CCTV Hacker Managed Services Provider Project Management Mobile Device Managment Computing Human Error Social Engineering Licensing Conferencing Business Technology Remote Monitoring Office Botnet Intranet Chromebook Authentication App Bluetooth Windows Technology Automation The Internet of Things Dark Web Telephone Systems Spyware Virtual Reality IoT Humor Cloud Downloads Windows 10 Uninterrupted Power Supply Cybersecurity User Error Productivity Firefox Break Fix User Tips Budget Networking Email Bring Your Own Device Net Neutrality Software Favorites Encryption Twitter Business Management Analytics Documents IT Services Finance Lithium-ion Battery Technology Tips Alt Codes Website Blockchain Multi-Factor Security Mouse IBM Monitors Point of Sale Safety Wireless Nanotechnology IT Budget Cyber Monday Virtualization Data Backup Mobile Device Management Alert Security Cameras Hiring/Firing IT Management Tablet Fraud Star Wars Black Friday Cloud Computing Storage Upgrades Samsung Collaboration Android Upgrade Electronic Health Records Managed IT Service Zero-Day Threat Chrome Workplace Tips Update Infrastructure Connectivity

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...