Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Visiting Useful Windows 10 Features

Tip of the Week: Visiting Useful Windows 10 Features

Windows 10 isn’t just a great operating system for getting things done--it’s also jam-packed with features that you might not even have known about. This week’s tip is all about some of the handy features that Windows 10 can provide for your office.

Continue reading
0 Comments

66% of Organizations Will Wait for Their Operating Systems to “Expire” Before Upgrading

b2ap3_thumbnail_upgrade_your_os_400.jpgWhen it comes to technology, upgrading is part of the package. Despite this being a well-established fact, some business owners will delay upgrading for as long as possible, while others will upgrade as soon as the latest product is released. What’s behind a company’s motivation to upgrade or not? We can better understand this by looking at a study on why businesses upgrade their operating systems.

Continue reading
0 Comments

Windows Server 2003’s End of Support Date is Fast-Approaching

b2ap3_thumbnail_windows_server_2003_400.jpgLast year, Microsoft pulled the plug on Windows XP’s support. Now, one year later, Windows Server 2003 is scheduled to meet its demise. If your servers are still running Windows Server 2003 as their operating system, it’s important to upgrade before the end of support date of July 14th. Otherwise, you could be running a server operating system without necessary patches and security updates.

Continue reading
0 Comments

Tip of the Week: 4 Android Device Lock Settings

b2ap3_thumbnail_android_security_400.jpgThe busy business owner keeps sensitive work-related information stored on their mobile device. If he lost the device, it could have disastrous results, especially if the device were to fall into the hands of an experienced hacker or competitor. Just in case, it’s a best practice to always lock your mobile devices. How do you choose the Android lock feature which is right for your unique needs?

Continue reading
0 Comments

What do CIOs Really Think of Windows 10?

b2ap3_thumbnail_opinions_of_windows_10_400.jpgWindows 10, the next big Microsoft’s Windows operating system, has a lot to live up to, and enterprises have had the chance to experiment with the technical preview for the past month. While the operating system will still be in development for the better part of next year, some professionals are forming opinions of what to expect from it. From the technical preview, what do businesses think of Windows 10 so far?

Continue reading
0 Comments

Why Did Microsoft Skip Windows 9? Because Seven Eight Nine! (Get it?)

b2ap3_thumbnail_windows_10_400.jpgThe news is out; what was previously thought to be Windows 9, codenamed “Threshold,” has been revealed to be Windows 10. While leaks have already shown us quite a bit of what the latest installment of Windows can do, the official reveal goes into more detail about the nature of Windows 10 for enterprises and even common users. First, let’s go over what we already know about the enigmatic new operating system, then we’ll get into the juicy new details.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Windows Recycling Notifications Remote Computing iPhone Tip of the Week Cyber Monday IT Support Mobile Device Finance HIPAA Information Cache Google Calendar Google Wallet Google Drive Document Management Training Dark Web PowerPoint Authentication Microsoft Excel Big Data Microsoft Office Small Business Digital Payment Web Server Disaster Resistance Hardware Address Unified Threat Management Display Upgrades Cortana Techology Current Events Server Management Politics Privacy E-Commerce WiFi Google Docs Hotspot Procurement Lenovo Data Breach Technology Tips BDR Managed IT services Computing Infrastructure Travel Office Tips Bring Your Own Device Utility Computing Net Neutrality Firewall Administrator Disaster WPA3 Machine Learning Retail Environment Mobile Office Disaster Recovery Google Maps Hosted Solutions VoIP Presentation Cabling Managed Services Provider Applications Vulnerabilities Telephony Webcam Chatbots Content Filtering Distributed Denial of Service Deep Learning Redundancy Touchscreen Mobile Devices Mobile Security Education Cleaning Vendor Management Miscellaneous IT solutions GPS Business Black Market Geography Fun Best Practice Encryption Uninterrupted Power Supply Proactive Windows 8 Corporate Profile Halloween Analyitcs Mobile Device Management Alert Alt Codes Troubleshooting Remote Monitoring Read Only Wireless Technology ROI Virus Development Superfish IT Consultant Automation Undo Websites Scary Stories Mobile Computing Application Productivity Tip of the week IT Consulting Managed IT Services Email Regulations Users Physical Security Computers Digital Money Hosted Solution Mobile Robot Business Growth Laptop Cables Managed IT Service Network Security Consultation Black Friday Facebook Test Router IT Support Comparison Marketing Management Heating/Cooling Fleet Tracking Time Management Phone System BYOD IP Address Best Practices Hacks Update Government Network Writing Tablet Hackers Point of Sale Mobile Data Google Identities Data Private Cloud Customer Service Firefox Programming Telephone Systems Virtualization Infrastructure Business Intelligence Printer Software Tips Ransomware Computer Electronic Medical Records Budget Monitors Windows 10 Theft Legislation App Going Green Risk Management Security Flexibility Humor Favorites Samsung Computer Repair Healthcare Holiday Outsourced IT Technology Laws User Authorization Communication Permissions USB Downtime Software as a Service Antivirus Cooperation Browser Bluetooth Relocation Cameras Employee-Employer Relationship Cookies Identity Theft Digital Signature Blockchain Paperless Office Apple Unsupported Software Network Management Saving Money WannaCry Instant Messaging Twitter MSP Windows 10 Customer Relationship Management Business Management Spam Project Management Chromebook Artificial Intelligence Hacker Electronic Health Records Wi-Fi Tech Support Efficiency End of Support Human Error VoIP Mail Merge Productivity Entrepreneur Word Sports Screen Reader Motion Sickness Automobile SharePoint CIO Break Fix Assessment IT service Bitcoin Server PDF Business Owner Employees Office 365 Tracking Cloud Hard Drives Smart Technology Knowledge Workplace Tips IT Management Social Social Engineering Quick Tips Piracy Downloads Taxes Upgrade Help Desk Managing Stress Cost Management IT Technicians Public Cloud Networking Data Warehousing Nanotechnology Specifications Drones Enterprise Resource Planning Collaboration Cybersecurity High-Speed Internet Buisness Patch Management Computing Business Continuity Proactive IT Cybercrime Two-factor Authentication Storage Internet of Things IBM Hard Drive Bandwidth Refrigeration Files IT Budget Servers Health Intranet Multi-Factor Security Asset Tracking Data storage Recovery Analytics Conferencing Unified Communications Safety Law Enforcement How To Scam Bookmarks Search Trending Identity Emoji Consumers SaaS Hacking Data loss Save Time Augmented Reality Enterprise Content Management Smartphone Website Data Management Backups Permission Fraud Sync Migration Connectivity Backup and Disaster Recovery Modem Competition Experience Cyberattacks Staff Apps eWaste Motherboard Mobile Device Managment Legal Remote Monitoring and Management Features 5G Mouse Cloud Computing Statistics Computer Care Botnet Processors Virtual Reality Hard Disk Drive Personal Information Innovation Network Congestion Internet Software Outlook Security Cameras Data Security Password Printing communications Star Wars Mirgation Virtual Private Network Wearable Technology Managed Service User Tips File Sharing 3D Printing Passwords Shortcut Financial Typing Gadgets LiFi Monitoring Save Money Crowdsourcing Hiring/Firing Avoiding Downtime Data Backup Technology Backup How To Android User Error Smartphones Lithium-ion Battery RMM IoT Data Recovery History Spyware Zero-Day Threat Co-managed IT Wires Tech Terms Staffing VPN Malware Running Cable Domains Gmail Operations Language Gadget Licensing Cryptocurrency Alerts Remote Workers Information Technology Documents OneNote Administration Phishing CCTV Maintenance Smart Tech Vulnerability Internet Exlporer Consulting Chrome Managed Service Provider The Internet of Things Operating System Dark Data Employer-Employee Relationship Supercomputer Virtual Desktop Solid State Drive Remote Worker YouTube Office Work/Life Balance G Suite Microsoft Managed IT Unified Threat Management Business Technology Public Speaking Social Networking Saving Time Mobility Wireless Social Media Meetings Compliance Error Business Computing Tech Term Access Control Company Culture IT Services Settings

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code