Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Samsung Going With Non-Removable Batteries May Cause Injury to Idiots [VIDEO]

b2ap3_thumbnail_battery_safety_400.jpgIt’s been confirmed that Samsung is getting rid of both its removable battery and MicroSD slot for its newest line of Galaxy Note devices. This is a sad day for Galaxy fans that have always preferred the Android device over Apple’s iPhone for its customizable options such as these. For Samsung, it’s too early to tell if this will affect sales or not, but one thing’s for sure: a lot of phones will be destroyed before users “get it.”

Continue reading

Tip of the Week: 3 Ways to Improve Your iPhone’s Battery Life

b2ap3_thumbnail_iphone_battery_400.jpgThere are plenty of business owners out there who rely on their iPhone to stay connected to the office at all times. With so much use, your iPhone’s battery won’t last long; especially considering the incredible amount of applications that are being used on a regular basis. As you might imagine, a dead phone is practically useless. How can you boost the efficiency of its battery life?

Continue reading

5 Obscure Phone Chargers on the Market

b2ap3_thumbnail_charge_your_phone_with_these_400.jpgA lot of people have a car charger for their smartphone, and it’s easy to understand why. A smartphone can be the link between you and your business. But did you know that you have a lot of other, more obscure (and more interesting) choices for phone chargers?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Money Big Data Machine Learning Search Cables Monitoring Quick Tips Business Spam IT Support Network Security Mobile Device Cybercrime Favorites Save Time Outsourced IT Authentication Mobile Backup ROI Vendor Management Hosted Solution IT service Development Cache Backup and Disaster Recovery Cost Management Virtualization Google Chrome SaaS Authorization Virtual Private Network Networking Servers Computer Repair Business Intelligence Holiday Dark Web Digital Administration Halloween Administrator Electronic Medical Records Public Cloud Document Management Communication Blockchain Nanotechnology Cookies Tablet Identity Theft Sports Consumers CIO Staff Environment Typing Features Telephony Remote Worker Tip of the week Google Drive Productivity Project Management Data Management Mail Merge MSP Managing Stress Hard Drives Management Storage Government Security Data User Tips Employer-Employee Relationship Health Instant Messaging Artificial Intelligence Information Technology Marketing Help Desk Business Computing Risk Management HIPAA Co-managed IT Current Events Remote Computing Cyberattacks Scary Stories Enterprise Content Management Education Employees BYOD Refrigeration Piracy Chromebook G Suite Phishing Fraud Mobile Office Efficiency Automation Malware Corporate Profile Identity Microsoft Excel Heating/Cooling Cameras IT solutions Gadgets Computers Monitors Analyitcs Software as a Service Office 365 Electronic Health Records Printing Hiring/Firing Mobile Device Management Botnet Relocation Star Wars Recovery Travel Passwords Licensing Disaster Recovery Gmail Cloud Computing Workplace Tips Microsoft Office OneNote Automobile Bitcoin Digital Payment Address Social Media VoIP Maintenance Business Growth Documents Utility Computing Staffing Test Hard Drive Public Speaking Technology Laws Tech Support Deep Learning Remote Monitoring and Management Cyber Monday Upgrade Chatbots Apple Avoiding Downtime Mobility Software Tips Internet SharePoint Laptop Data loss Crowdsourcing Tech Terms Password E-Commerce Small Business Mobile Data Human Error Router Net Neutrality Hard Disk Drive Personal Information Running Cable Bookmarks Twitter GPS Employee-Employer Relationship Taxes Smartphones Apps Cabling Windows 10 Distributed Denial of Service Microsoft Alert Supercomputer How To Wireless Technology Computing Infrastructure Motion Sickness Scam Social Networking Webcam Enterprise Resource Planning Tracking Specifications Websites Permissions Assessment Entrepreneur The Internet of Things Outlook Encryption Productivity Remote Workers Business Continuity Writing IT Consultant Printer Lithium-ion Battery Error Vulnerability Emoji Intranet Bring Your Own Device Lenovo Virtual Desktop YouTube PowerPoint Analytics IT Technicians Technology Tips Mouse Facebook Unified Threat Management Processors File Sharing Augmented Reality Managed IT History Mobile Devices Cybersecurity Trending Mirgation Drones Google Wallet Access Control IoT Meetings Knowledge Humor Identities Office IT Consulting Word Break Fix Software Hotspot Financial Best Practices Cooperation Point of Sale Office Tips Troubleshooting Cleaning Proactive IT Social Engineering Politics Internet Exlporer Saving Time Smart Technology How To VPN Cryptocurrency Managed Services Provider Windows 10 Cortana Internet of Things eWaste Black Friday Robot Google Calendar Regulations Mobile Security Redundancy Safety Asset Tracking IT Services LiFi USB Settings Buisness Touchscreen Business Technology Wi-Fi Computer Patch Management Network Screen Reader Flexibility Language Two-factor Authentication Managed Service Computing Conferencing Smartphone Applications Save Money Read Only VoIP Managed Service Provider Google Docs Tip of the Week Network Management Hackers Firefox Multi-Factor Security Fleet Tracking Display Best Practice Statistics Computer Care Technology Data Backup Recycling iPhone IT Budget Consultation IP Address Time Management Content Filtering Solid State Drive Uninterrupted Power Supply Procurement App Compliance Permission Virtual Reality Windows 8 Miscellaneous Vulnerabilities Antivirus Fun Data Warehousing Mobile Device Managment 3D Printing Black Market Going Green Firewall Alerts PDF Notifications Hacker Motherboard Operations Social communications Security Cameras Phone System Saving Money Experience Geography Data Security Healthcare Tech Term Business Owner Operating System Server Finance 5G Theft Company Culture Samsung Files Gadget Data storage High-Speed Internet Proactive Legislation Network Congestion Information Zero-Day Threat Unified Threat Management Email Application Cloud Shortcut Disaster Resistance Ransomware Law Enforcement Comparison Infrastructure Domains WannaCry Innovation Sync Web Server Virus IBM Unsupported Software Undo Business Management Downloads Bandwidth Programming Data Breach Upgrades IT Support Hosted Solutions Privacy Alt Codes Presentation Retail Backups Customer Service Private Cloud Migration Android Training Google Maps CCTV RMM Website WPA3 Dark Data Server Management Competition Connectivity Budget Downtime Remote Monitoring Managed IT Service User User Error Superfish Unified Communications Bluetooth Disaster IT Management Legal Update Paperless Office Customer Relationship Management Digital Signature Wires Hacks Hardware WiFi Data Recovery Work/Life Balance Physical Security BDR Managed IT services Modem Wireless Consulting Hacking Windows Techology Users Smart Tech End of Support Mobile Computing Browser Telephone Systems Managed IT Services Collaboration Wearable Technology Spyware

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...