Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Tweak These 5 Mobile Apps to Consume Less Data

Tip of the Week: Tweak These 5 Mobile Apps to Consume Less Data

Chances are that if you’re using a smartphone, you’ll have your WiFi turned on as often as you possibly can. This helps to keep data hogs (applications that use a ton of your monthly allotted mobile data) at bay. However, not everyone has the convenience of an Internet connection at all times, particularly while you’re out of the office. Here’s how you can limit the damage done by your favorite smartphone apps.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Document Management Remote Computing Downtime Crowdsourcing Environment Office Tips Data Breach Computers Security Cameras LiFi Cloud iPhone Computer Care Legal Administration Technology Laws BDR Server Mobile Device Managment Trending Tech Terms Scary Stories Application Operating System Cyberattacks Word IT Budget Procurement Consultation Documents Cables Windows 7 Cache Microsoft Excel Mobility Windows 8 Browser Files Password Microsoft Distributed Denial of Service Automobile Multi-Factor Security Time Management Data Recovery Wires Public Speaking Corporate Profile Physical Security Cabling Mobile Devices Technology Computer Repair Solid State Drive Security Chromebook VoIP Entrepreneur Communication Law Enforcement Going Green Proactive Instant Messaging Cameras IT Support Spyware Techology Analyitcs MSP Computing Infrastructure Unsupported Software Facebook Tip of the week Software as a Service Ransomware Domains Digital Payment Bluetooth End of Support Wasting Time Operations Mobile Office Best Practices Identity Electronic Health Records Two-factor Authentication Outlook Network Settings Cyber Monday Software Superfish Business Continuity Smartphones Hosted Solutions Error Read Only Travel Network Management Big Data Remote Monitoring and Management Programming Computer E-Commerce Alt Codes PowerPoint Virtual Reality How To Conferencing Telephone Systems Connectivity Phishing Website Phone System Break Fix Cryptocurrency Relocation Information Technology SaaS Backups Regulations Health Mouse Augmented Reality IT solutions Sports BYOD Internet YouTube Google Wallet Spam Identity Theft Features Data storage Motion Sickness Lenovo Managed IT services Presentation Hard Drive IT Management Privacy Network Security Lithium-ion Battery 3D Printing Downloads Infrastructure Cookies Compliance Robot Telephony Undo Government OneNote Test Android Google Maps IT Services Cost Management Artificial Intelligence Business Computing Saving Money Information Content Filtering Voice over Internet Protocol Bandwidth Business Intelligence Project Management Chatbots Cybersecurity Enterprise Content Management Disaster Recovery Social Networking Save Time Mobile Data IoT Vulnerability Efficiency Digital Signature Buisness Servers Emoji Mobile Device Management Google Drive Passwords PDF Tablet Business IP Address Access Control Money WiFi Hard Drives Outsourced IT Monitoring Business Technology Hiring/Firing Net Neutrality Laptop Bring Your Own Device Writing Training Retail Consumers SharePoint Miscellaneous Office 365 VoIP Small Business Google Docs WPA3 Uninterrupted Power Supply Marketing Risk Management GPS Utility Computing Virtual Assistant Identities Employer-Employee Relationship Managed Service Bookmarks Apple Printer Vulnerabilities Humor Mirgation Backup and Disaster Recovery Networking Heating/Cooling Processors Cybercrime Public Cloud Troubleshooting Apps Hackers Managed IT Services eWaste Wireless Technology Productivity Firefox CIO History Finance Productivity Geography Managed IT Service Employees Deep Learning Permissions Samsung Wi-Fi Remote Worker Unified Threat Management Computing Innovation IT Technicians Help Desk Intranet Electronic Medical Records Collaboration Machine Learning Customer Service Avoiding Downtime Botnet Save Money Quick Tips Mobile Alerts Recycling Refrigeration Competition Halloween IT Support Analytics Data Backup Software Tips Fraud Holiday Assessment Black Friday Hotspot Storage Budget Google Calendar Hardware Monitors Sync Wireless Human Error Customer Relationship Management Upgrades Virtual Desktop Tech Term Mail Merge Router Staff RMM Theft Knowledge Remote Workers Database Blockchain Virtualization Internet Exlporer Malware Managing Stress Work/Life Balance Specifications Unified Threat Management Current Events Smart Tech Disaster Maintenance Experience Twitter Server Management User Tips Private Cloud G Suite Touchscreen Piracy Network Congestion Fleet Tracking Managed IT Business Growth Employee-Employer Relationship IT Consultant Disaster Resistance Motherboard Screen Reader Gadget Google Politics Applications Tech Support Vendor Management Windows Bitcoin IT Consulting Windows 10 Websites WannaCry Digital Drones User Error Mobile Computing Dark Web Firewall File Sharing Data Warehousing Virus Hard Disk Drive Gmail Taxes Meetings Data Security Running Cable Co-managed IT Virtual Private Network Supercomputer Alert Email Administrator Chrome Paperless Office Managed Services Provider Hacker Managed Service Provider Favorites Users communications Dark Data Cortana Redundancy Proactive IT Social Fun Star Wars How To Technology Tips Language Data Tracking Mobile Security Internet of Things Workplace Tips Hacks Business Owner Healthcare Search Office Saving Time Personal Information Address Social Engineering Remote Monitoring Windows 10 Statistics Notifications 5G Cloud Computing Management Authentication App Professional Services Update Development Company Culture Notes USB Upgrade Social Media Authorization Automation Enterprise Resource Planning HIPAA Web Server User Wearable Technology Unified Communications Black Market High-Speed Internet Zero-Day Threat Nanotechnology Patch Management Hacking Scam Recovery Flexibility Webcam Smartphone Modem Shortcut Staffing ROI Encryption Legislation Antivirus Data loss Backup Smart Technology Comparison Licensing Education Safety The Internet of Things IT service VPN Cooperation Permission Point of Sale Asset Tracking CCTV Migration Best Practice Printing Financial Hosted Solution Business Management IBM Data Management Microsoft Office Typing Cleaning Mobile Device Tip of the Week Display Gadgets Consulting

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...