Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Monitors Machine Learning IT Consulting Google Maps Access Control Mail Merge PDF Outlook Crowdsourcing Relocation Heating/Cooling Assessment Settings Enterprise Resource Planning Mobile Devices Black Friday Applications Efficiency Cooperation Instant Messaging Spyware Vendor Management Operations IT Technicians Technology Laws Administrator Managed Service Provider Printing Cabling Spam Bluetooth Collaboration Cybercrime Phishing VoIP Proactive IT Virtual Desktop SaaS Customer Service Managing Stress Wires Business Intelligence Phone System Remote Worker Hard Drives Blockchain How To Saving Money Firewall Gadget BYOD Fleet Tracking Browser Innovation Storage Windows Antivirus Environment Computer Mobile Running Cable Compliance Automobile Hosted Solution Mobile Computing Disaster Wi-Fi Permission Social Media Nanotechnology Google Wallet Smartphone Dark Web Managed IT Human Error Features Hosted Solutions iPhone Comparison Analytics Software as a Service Cost Management Development ROI Saving Time Mobile Data Downloads Bring Your Own Device End of Support Politics Email Avoiding Downtime Halloween Undo Files Information Technology Cyber Monday Productivity Piracy Authentication eWaste Lithium-ion Battery Typing Apple Users Address Server Apps Data Breach IT Services Display Redundancy Facebook Network Management Legislation Best Practices Humor Theft RMM Cloud Computing Internet of Things Going Green Wireless Internet Exlporer Hacking Taxes IBM Smart Technology Data Backup Microsoft Office Data storage Alert Mobile Device Management Cybersecurity communications LiFi Passwords IT Management IT service Conferencing Travel Marketing Read Only Business Owner Small Business IT Support Hard Drive Licensing Recovery Project Management Cookies Upgrade Tech Support Financial Sports Vulnerability Multi-Factor Security Data Warehousing Consultation CIO Microsoft SharePoint Quick Tips E-Commerce Cortana Google Docs Internet Maintenance Servers Alerts Error Consumers Unified Threat Management Virtual Private Network Network Congestion Laptop Authorization Flexibility Shortcut Tech Term Staff Business Dark Data Language Staffing Wireless Technology Retail Websites Managed IT Service Cryptocurrency Botnet Identities Fun 3D Printing Hotspot Microsoft Excel Employee-Employer Relationship Knowledge Gmail Uninterrupted Power Supply Artificial Intelligence Automation Wearable Technology Computers Data loss Monitoring Proactive Virtualization Bandwidth Presentation VoIP Consulting Smart Tech Hardware Windows 10 Content Filtering Permissions Hard Disk Drive Operating System Mobile Office IP Address Identity Theft Cables Backup Mobile Security Computing Infrastructure Bitcoin BDR Best Practice Specifications Encryption Application Sync Budget Public Cloud Two-factor Authentication Private Cloud Employer-Employee Relationship Remote Workers Tech Terms Server Management Notifications Mobile Device Managment Backups Star Wars Documents WannaCry Website Motion Sickness High-Speed Internet Programming Work/Life Balance Entrepreneur Bookmarks Word Windows 10 Government Google Calendar Business Management Business Computing Ransomware Techology Remote Monitoring Cache Hiring/Firing Refrigeration Computing Gadgets Remote Computing Hacker Productivity Managed Service Google Drive Technology Mobile Device Chromebook Unified Threat Management Webcam Web Server Troubleshooting File Sharing CCTV Favorites IT Budget Meetings Digital Payment Business Continuity How To Regulations Healthcare Legal Chatbots Software Tips Networking Vulnerabilities Smartphones WPA3 Black Market Information Mouse Windows 8 Hackers IT Support Malware Social Engineering Computer Care Chrome Robot Software Disaster Resistance Cleaning Co-managed IT Network Office 365 Unified Communications Managed IT Services 5G Point of Sale Statistics Safety Procurement Supercomputer Data Superfish Google Upgrades Administration Social Networking HIPAA VPN IT Consultant Virtual Reality Cameras Infrastructure Connectivity Analyitcs Personal Information Downtime Distributed Denial of Service Risk Management Emoji Printer WiFi Break Fix Digital Test Search Samsung Android Corporate Profile Current Events Physical Security Competition Scam Holiday Cloud Workplace Tips Data Recovery Save Time Update Utility Computing User Tips Tracking Miscellaneous USB Office Touchscreen Solid State Drive Mirgation Telephony Privacy Computer Repair Deep Learning Experience Office Tips Security Cameras Geography Backup and Disaster Recovery Enterprise Content Management Law Enforcement Electronic Health Records Password Company Culture Recycling Tip of the week Firefox Hacks Security History Augmented Reality Customer Relationship Management Data Security Electronic Medical Records Virus Education Outsourced IT Asset Tracking Disaster Recovery User Network Security Net Neutrality Time Management Writing MSP Mobility Motherboard Health Help Desk Digital Signature Processors Fraud The Internet of Things Public Speaking Business Technology Money Business Growth Twitter Managed Services Provider Screen Reader Zero-Day Threat Modem YouTube Managed IT services Patch Management Training Document Management IoT IT solutions G Suite Unsupported Software Employees GPS App Tip of the Week Trending Save Money PowerPoint Management OneNote Tablet Identity Big Data Intranet User Error Paperless Office Router Scary Stories Telephone Systems Lenovo Data Management Communication Remote Monitoring and Management Social Finance Technology Tips Cyberattacks Alt Codes Buisness Migration Domains Drones

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code