Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Tip of the Week: How to Put the Power Back into Your Laptop’s Battery

b2ap3_thumbnail_laptop_battery_saving_tips_400.jpgA laptop with no power can be a pain, especially when it only lasts a minimal amount of time. Sometimes it feels like you can’t operate at full capacity without leaving your laptop plugged in at all times. Thankfully, you don’t have to suffer from this, and with a little bit of troubleshooting and basic PC maintenance, you can prolong the life of your laptop’s battery significantly.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Break Fix Facebook Data loss Fraud Outlook Backups Chromebook Vulnerability Cost Management Productivity IP Address Paperless Office Augmented Reality Disaster Recovery Environment Data Management Bluetooth Mobile Apple Geography OneNote Machine Learning PDF Administration Personal Information Uninterrupted Power Supply BDR Employees The Internet of Things Information Technology Network Consultation Project Management Asset Tracking Healthcare IT Services Electronic Health Records Malware Miscellaneous Printing Business Technology Software as a Service Money Digital Payment Hackers Artificial Intelligence Managed IT Crowdsourcing Browser How To Tech Terms HIPAA IT Consulting Email Black Friday Remote Worker Computer Repair Laptop Cybersecurity Big Data Cleaning Writing Identity Theft Nanotechnology Development Business Owner Enterprise Resource Planning Permission Solid State Drive Settings Motion Sickness Heating/Cooling Windows 10 5G Technology Tips Training Printer Cameras Managed Service Proactive Wireless Holiday Vulnerabilities Cloud Ransomware Search Intranet Patch Management Virtual Private Network Running Cable Halloween Managing Stress Network Congestion Mouse Migration Quick Tips Recovery Business Management Wearable Technology Dark Web Notes Spyware Smartphone IT Consultant Update Staff Maintenance History Taxes Employee-Employer Relationship Save Money VoIP Enterprise Content Management Chatbots User Error Cybercrime Infrastructure Modem GPS Data Recovery Access Control Wi-Fi Staffing Domains Licensing Business Continuity PowerPoint Web Server Touchscreen Knowledge Flexibility Virus Law Enforcement Digital Signature Alert Display Efficiency iPhone Alerts Lenovo Bandwidth Passwords Statistics Tip of the Week Security Router Mobility Customer Service Application Google Docs Managed Services Provider Smart Tech Saving Money Google Calendar Error Hacks Favorites Samsung Tip of the week Sync Software Safety Google Operating System Phone System Windows 7 BYOD Storage Test Windows 10 Co-managed IT Avoiding Downtime Backup and Disaster Recovery Comparison Remote Workers Data Breach Hotspot Financial Upgrade Google Drive Regulations Analyitcs Company Culture WPA3 SaaS G Suite Small Business Competition Applications Collaboration eWaste Remote Computing Relocation Lithium-ion Battery IBM Professional Services USB How To Hosted Solutions Refrigeration Marketing IT Management Entrepreneur Identity Instant Messaging Sports Managed Service Provider Going Green Authentication Legislation Unified Threat Management Social VPN Internet Exlporer Save Time Managed IT services Innovation Users Word Tracking Microsoft Hardware Buisness Firewall Legal Management Files Computers Drones Document Management Webcam Hosted Solution Emoji Computer Care Mail Merge Connectivity CIO Gmail Communication Virtual Assistant Permissions 3D Printing MSP Hacker Gadget Android Analytics IT Support Servers IT solutions Experience Digital Twitter SharePoint Tablet Technology Laws Business Intelligence Mobile Computing Distributed Denial of Service Social Networking IT Technicians Cabling Consulting VoIP Blockchain Cache Office Mobile Device Monitoring Google Maps Automation Cryptocurrency Presentation Utility Computing Data Backup Network Management WiFi Botnet Customer Relationship Management Tech Term Address Two-factor Authentication Network Security Social Media Fun Office 365 Documents Content Filtering Telephone Systems High-Speed Internet YouTube Unified Communications Features Physical Security Hard Disk Drive Typing Black Market Mirgation Business Computing Supercomputer Cyber Monday Best Practices communications Humor Voice over Internet Protocol Remote Monitoring File Sharing Bitcoin Phishing Windows 8 Workplace Tips Net Neutrality Computing Infrastructure Server Management Point of Sale Human Error Cortana Proactive IT Meetings Fleet Tracking Redundancy Privacy Hiring/Firing CCTV Notifications Tech Support Encryption Data Security Mobile Device Managment Technology Virtual Reality Server Telephony Mobile Device Management E-Commerce Techology Time Management Authorization Troubleshooting Smart Technology Work/Life Balance Risk Management Firefox Piracy Outsourced IT Processors Recycling Zero-Day Threat Managed IT Service Mobile Security Google Wallet Mobile Devices Wires Antivirus Help Desk Monitors LiFi Vendor Management Cables Finance Productivity Information Mobile Data User Tips App Identities Superfish Hacking Downloads Hard Drive Security Cameras Motherboard Employer-Employee Relationship WannaCry Shortcut Unsupported Software Computer Business Growth IoT Conferencing Mobile Office Procurement Star Wars Backup RMM Office Tips Language Wireless Technology IT Support User Operations Microsoft Excel Apps Scary Stories Website Software Tips Multi-Factor Security Saving Time Electronic Medical Records Password Disaster Administrator Dark Data Cooperation ROI Specifications Upgrades Bring Your Own Device Travel IT Budget Government Networking Chrome Robot Scam Retail Internet of Things Smartphones End of Support Compliance Downtime Disaster Resistance Remote Monitoring and Management Private Cloud Alt Codes Data storage IT service Corporate Profile Theft Social Engineering Education Assessment Windows Computing Best Practice Virtual Desktop Business Public Cloud Wasting Time Public Speaking Websites Internet Automobile Gadgets Microsoft Office Virtualization Read Only Undo Bookmarks Deep Learning Unified Threat Management Data Warehousing Data Budget Cloud Computing Managed IT Services Database Current Events Hard Drives Screen Reader Programming Consumers Spam Trending Health Cyberattacks Cookies Politics

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code