Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

End of Support Bookmarks WPA3 Data Recovery Physical Security Spam Quick Tips Going Green Efficiency Professional Services communications Phone System Public Cloud Budget Computers Business Continuity Assessment Laptop Identity Applications Migration VoIP Software Tips Development Workplace Tips History Facebook Virtualization Authentication Cybercrime Legislation Botnet Miscellaneous Network Congestion Outlook Alt Codes Administration Safety High-Speed Internet Computing BYOD G Suite Data storage Smart Technology Touchscreen Robot Customer Service Maintenance IT solutions Save Money Google Calendar Star Wars Internet of Things Analyitcs Security Cameras Proactive Encryption Internet Exlporer Websites How To Favorites Avoiding Downtime Deep Learning Solid State Drive Managed IT Service Upgrades Mouse Downloads Google Wallet Mobility Storage Human Error Employer-Employee Relationship Piracy Operating System Remote Workers Virtual Desktop Electronic Medical Records File Sharing Analytics Smartphones Data Best Practice Zero-Day Threat Compliance Notes Business Technology Office Tips IT Technicians Hacker Productivity Managed Service Virtual Private Network Ransomware The Internet of Things Digital Customer Relationship Management Environment Automation Mobile Sync Undo Monitors Security Connectivity Remote Worker Staff Cybersecurity Error Multi-Factor Security Virtual Assistant Big Data Network Management Gadget Microsoft Office Shortcut Dark Data Cloud Cameras Electronic Health Records Router Application eWaste Tech Term User Identity Theft WiFi Buisness Cleaning Server Best Practices IoT Geography Distributed Denial of Service Cyber Monday Fraud Comparison HIPAA Statistics Halloween Project Management Break Fix Scary Stories Unified Communications Fun Phishing Permissions Information Supercomputer Windows Emoji Microsoft Saving Money Automobile Permission Data Security Webcam Business Management Twitter Health PowerPoint Screen Reader Disaster Resistance Hard Disk Drive PDF Staffing Notifications Business Computing VoIP Healthcare Tablet Bitcoin GPS VPN SharePoint Marketing Blockchain Information Technology Chatbots Competition Education Mobile Computing Crowdsourcing Cookies Heating/Cooling E-Commerce Chromebook Update iPhone Document Management Consumers Lenovo Database Cabling Internet Uninterrupted Power Supply Augmented Reality Black Friday Hosted Solutions Downtime Managed Services Provider Computer Cache Licensing LiFi Google Communication Unified Threat Management Identities Tip of the Week Co-managed IT Government Passwords Managed IT services Utility Computing Access Control Bring Your Own Device Wi-Fi Upgrade Machine Learning IT Budget Modem Mobile Devices Cryptocurrency Law Enforcement Telephone Systems Management Apps Business Data Warehousing Wearable Technology Retail Point of Sale Enterprise Content Management Training Alert Computing Infrastructure Windows 10 Hosted Solution Programming SaaS Drones Holiday Firewall Cables Vulnerabilities Flexibility Settings IT Management Experience Bluetooth BDR Processors Tech Support Vulnerability Hiring/Firing Dark Web Productivity Asset Tracking Website Administrator Network Security Disaster Fleet Tracking Email Business Growth Technology Business Intelligence Read Only CIO Managed IT Services Vendor Management Backup Content Filtering Running Cable Black Market Gmail Server Management Consultation Hardware Motion Sickness Computer Repair Redundancy Social Media Employees Word Humor Superfish 3D Printing Firefox Money Network Malware ROI Taxes Risk Management Technology Tips Remote Computing Features Artificial Intelligence Net Neutrality User Error Digital Payment RMM Managed Service Provider Virus Software Techology Data Breach 5G Office Voice over Internet Protocol Domains IT service Alerts Specifications Managed IT Saving Time Google Docs Authorization Unified Threat Management Mobile Data Hacking Employee-Employer Relationship Regulations Password OneNote CCTV Cortana Users Legal Remote Monitoring and Management Telephony Refrigeration Tech Terms Hacks Typing Mobile Device Management Unsupported Software Files Hotspot Conferencing Antivirus Save Time Procurement Chrome Troubleshooting Small Business Hackers Servers Mobile Security Collaboration Politics Paperless Office WannaCry Operations IBM Android Smartphone Data Backup Instant Messaging Patch Management Windows 8 Mobile Device Managment Backup and Disaster Recovery Wires Finance Nanotechnology Sports Language Digital Signature MSP Knowledge IT Support Enterprise Resource Planning IP Address Bandwidth Wireless Virtual Reality Theft Cyberattacks Presentation App Web Server Search Financial Test Work/Life Balance Two-factor Authentication Mobile Office Spyware Recycling User Tips Mail Merge Gadgets YouTube Address Monitoring Printer Display Private Cloud Remote Monitoring Outsourced IT Wasting Time Entrepreneur Lithium-ion Battery Google Drive Help Desk IT Support IT Services Technology Laws Company Culture Windows 7 Wireless Technology Smart Tech Browser Social Networking Office 365 Data Management Printing Data loss Proactive IT Corporate Profile Trending Mirgation How To Relocation Infrastructure Apple Public Speaking Intranet Hard Drive Hard Drives Software as a Service Mobile Device Cooperation Social Travel Google Maps Backups Recovery IT Consultant Samsung Consulting Social Engineering Personal Information IT Consulting Windows 10 Managing Stress Time Management Microsoft Excel Tracking Cost Management Computer Care Documents Business Owner Privacy Innovation Writing Motherboard Scam Cloud Computing Meetings Disaster Recovery Tip of the week Networking USB Current Events

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code