Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Tweak These 5 Mobile Apps to Consume Less Data

Tip of the Week: Tweak These 5 Mobile Apps to Consume Less Data

Chances are that if you’re using a smartphone, you’ll have your WiFi turned on as often as you possibly can. This helps to keep data hogs (applications that use a ton of your monthly allotted mobile data) at bay. However, not everyone has the convenience of an Internet connection at all times, particularly while you’re out of the office. Here’s how you can limit the damage done by your favorite smartphone apps.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Flexibility VPN Holiday Alt Codes Bookmarks Best Practice Google Drive Blockchain Connectivity Motion Sickness Legislation Outlook Smartphone Business Owner IBM Geography Administrator Bluetooth Firefox Printer Files Business Management Computers Unified Threat Management Education Data Security Monitors Unified Communications Drones Avoiding Downtime Cybercrime Server Management Money Tech Terms IT Support RMM User Documents Wires Data loss Two-factor Authentication Authorization Encryption Tip of the week Statistics Software as a Service LiFi Motherboard Google Wallet IT solutions Patch Management Operating System Bring Your Own Device Update Samsung Passwords Marketing Smart Tech Safety Notifications Artificial Intelligence Word Customer Service iPhone Refrigeration Twitter Quick Tips Microsoft Excel VoIP Password Hosted Solutions Data Warehousing Hard Drive Private Cloud Mail Merge Tech Support Microsoft Office Hard Drives ROI Internet Data Backup Social Networking Webcam Hackers Applications Black Market SaaS Security Cameras Innovation Instant Messaging Troubleshooting Phone System Paperless Office Favorites Web Server Internet of Things Machine Learning Disaster Recovery CCTV Remote Worker Windows 10 MSP Apple Workplace Tips Best Practices Managed IT Services Access Control Cryptocurrency Procurement Theft Cyber Monday Identities Star Wars Compliance Cybersecurity Business Technology Augmented Reality Deep Learning Miscellaneous Office Tracking Personal Information Supercomputer Features How To Redundancy Tech Term The Internet of Things Data Recovery Travel Google Hiring/Firing Techology Specifications Social Media Save Money BDR Computer Help Desk Network Congestion Cortana Phishing Hacks Efficiency Cameras Alerts Search IT Management Save Time IP Address Users Firewall Regulations Crowdsourcing HIPAA Writing Maintenance Employer-Employee Relationship Sports Alert Licensing Buisness Botnet Information Technology Vulnerabilities Public Speaking Chromebook Upgrades Virtual Private Network Ransomware Productivity Mobility Piracy App End of Support Remote Workers Software Tips Antivirus Assessment Risk Management Windows 8 Cost Management Dark Data User Error Privacy Facebook Virtual Desktop Mobile Device Management Presentation Document Management Emoji Telephone Systems Business Intelligence Knowledge Managed Service Provider Processors Settings Disaster Malware Retail Proactive IT Human Error Hosted Solution Fun BYOD Conferencing Touchscreen Automation Application Outsourced IT Fleet Tracking Disaster Resistance Language Authentication Employees Backup and Disaster Recovery Trending Network Management Cloud Computer Repair Security Digital Payment Vulnerability Staff Computer Care Wireless Technology Google Maps Managed IT services YouTube Read Only Automobile Websites Dark Web Bitcoin USB Mobile Security Bandwidth Government Undo Communication Router Training Hacker Social Engineering Programming Windows 10 OneNote Zero-Day Threat IT Technicians Software Recycling Google Calendar Lenovo Microsoft Sync Screen Reader Social Business Computing Productivity Uninterrupted Power Supply Networking Finance Customer Relationship Management Computing Co-managed IT Wireless E-Commerce Mobile Device History Backup Telephony Identity Legal Data storage Chatbots Physical Security CIO Net Neutrality Mobile Computing WannaCry Printing Taxes Gadgets Hotspot Lithium-ion Battery Downloads Unified Threat Management Competition GPS Spam Managing Stress Hardware Backups Comparison Utility Computing Managed IT Service Display Scary Stories Solid State Drive Storage Cleaning IT Support Apps Public Cloud PDF User Tips Google Docs Upgrade Cookies Virtual Reality Content Filtering Scam Halloween Administration Point of Sale Analyitcs Tablet Email Infrastructure Collaboration Analytics Consultation Remote Monitoring and Management How To Big Data Office Tips Data Breach Shortcut Cables Technology Tips Wi-Fi Hacking Hard Disk Drive Windows IT Consultant Tip of the Week Business Managed Services Provider Mobile Office Laptop Budget Information Heating/Cooling Employee-Employer Relationship Time Management Mouse Saving Money Running Cable eWaste Network Security Smart Technology Law Enforcement Cloud Computing Website Servers 5G Black Friday Gadget Mobile Healthcare Intranet Small Business Break Fix Consumers Server Humor VoIP File Sharing Test Going Green Corporate Profile Staffing Spyware Fraud Managed IT Virus Data Vendor Management IT Consulting Mirgation Saving Time Remote Computing WiFi IT Services Financial Digital Signature Superfish Browser 3D Printing Cabling Managed Service Entrepreneur Development Project Management Proactive Permission Remote Monitoring Enterprise Content Management Politics Operations Error Mobile Devices Current Events Mobile Data Electronic Health Records Technology Environment Chrome Unsupported Software Management IoT Domains Health Company Culture Migration SharePoint Mobile Device Managment Meetings Consulting Network Distributed Denial of Service Wearable Technology Robot IT service Recovery Technology Laws Business Growth Nanotechnology High-Speed Internet Downtime IT Budget Digital Office 365 Relocation Smartphones Experience Multi-Factor Security Monitoring WPA3 Internet Exlporer communications Android Data Management Computing Infrastructure Asset Tracking Gmail Cache Identity Theft Cooperation Electronic Medical Records Cyberattacks G Suite Typing Work/Life Balance Permissions PowerPoint Business Continuity Enterprise Resource Planning Modem Address Virtualization

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...