Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Next Job on the Automation Chopping Block: Pizza Delivery

Next Job on the Automation Chopping Block: Pizza Delivery

Did you know that over 2,000 Domino’s Pizza franchises in Australia, New Zealand, France, Belgium, The Netherlands, Japan, and Germany feature delivery by robot? Starship Technologies, a self-driving robotics company, announced on March 29th that they would be partnering with Domino’s to revolutionize the way the delivery process works.

Tags:
Continue reading
0 Comments

Alert: Android Malware Can Control Your Phone Through Twitter

Alert: Android Malware Can Control Your Phone Through Twitter

Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this manner, making this a major cause for concern.

Continue reading
0 Comments

When Online Teaching Assistants are Really Robots in Disguise

When Online Teaching Assistants are Really Robots in Disguise

Many students are taking advantage of online education, yet there are some pitfalls that can hold students back; namely, the lack of face-to-face interaction and assistance from the instructor. Now, artificially intelligent teaching assistants might be able to offer some reprieve to this issue.

Continue reading
0 Comments

Aspiring Authors Beware: An AI Program Almost Won a Literary Award

b2ap3_thumbnail_ai_author_400.jpgEven if artificial intelligence is still a long ways off, people always try to emulate it and push it toward greater heights. One of the best, most recent examples, is how an artificially intelligent program co-wrote a short novel (or novella) that almost won the Hoshi Shinichi Award. If it won the award, it would have been groundbreaking, but the fact that it came so close to doing so begs the question: how long will it be before computers can emulate human creativity?

Continue reading
0 Comments

The Future is Here: Domino’s Now Has Pizza-Delivering Robots

b2ap3_thumbnail_pizza_robot_400.jpgRobotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

IT Consultant Paperless Office Google Maps Tip of the week Data Backup Samsung Troubleshooting Electronic Health Records Mobile Office Tracking Wires Data loss Cloud Computing Social Media Hard Drive Regulations IT Services Managed IT Service Saving Money Statistics Firefox Security LiFi Specifications Staffing Authorization Applications Hosted Solutions Phishing Comparison Server Management Holiday Document Management Managed IT Services Business Management Multi-Factor Security Spyware Corporate Profile Uninterrupted Power Supply Artificial Intelligence Information Net Neutrality IT Consulting OneNote Cyberattacks Development File Sharing MSP Browser Legislation Mobile Data Identity Theft Virtual Desktop Law Enforcement Business Owner Emoji Retail Office Travel VPN Hiring/Firing Web Server Entrepreneur Drones Smartphones History E-Commerce Cortana Windows 10 Redundancy Mail Merge Customer Service Software as a Service Meetings Office Tips Sports Lenovo Error Backup Procurement Relocation Disaster Recovery Productivity Gadget Cybersecurity Disaster Miscellaneous Outsourced IT Application Windows 10 Migration Private Cloud Current Events Nanotechnology Cryptocurrency iPhone Google Management Data Recovery Google Docs IT Technicians Automobile Politics Asset Tracking YouTube Network Security Social Mobile Computing SharePoint Unified Threat Management Outlook Cabling Wireless Technology Licensing Read Only WPA3 Marketing Backup and Disaster Recovery Apple Botnet Display Virus Risk Management Google Calendar Managed Service Provider Address Screen Reader Motherboard Data storage ROI Work/Life Balance Identity Data Permissions Best Practice Digital Signature Permission Help Desk Operations Domains Hacking Assessment IBM Wireless Authentication Robot Computer Repair Gadgets Internet of Things App Efficiency Public Speaking Chatbots Software Settings Chrome Humor eWaste Windows Cloud Supercomputer Digital Payment Telephone Systems Knowledge Notifications GPS Tablet Black Market Network Congestion High-Speed Internet Dark Data Theft The Internet of Things PDF IT service Distributed Denial of Service User Error Healthcare Programming Disaster Resistance Hacks Hardware Virtual Reality Budget Productivity Mobile Device Managed IT Best Practices Office 365 Downtime Printer Server Business Technology Search Computing Infrastructure Tip of the Week Consultation Bring Your Own Device 3D Printing Computing Network Features Cache How To Time Management Company Culture Saving Time User Tips Running Cable Firewall Downloads Cables Microsoft Alt Codes Consulting Touchscreen Managed Services Provider Mobile Geography Unified Threat Management Password Co-managed IT Monitoring Wi-Fi Content Filtering Collaboration Electronic Medical Records Hotspot Microsoft Office Machine Learning Consumers Tech Terms Wearable Technology Word Facebook Halloween Proactive Unsupported Software Trending Save Time Administration Education Remote Monitoring and Management RMM Business Growth Networking Update Heating/Cooling Business Continuity Technology Router Business Computing Project Management Vendor Management Test Hard Disk Drive Privacy Data Warehousing Conferencing Finance Smart Tech Intranet Recycling IoT Compliance Sync Customer Relationship Management IT solutions Monitors Enterprise Content Management Phone System Encryption CCTV Hackers Staff Taxes Files Mobile Devices VoIP Ransomware Social Networking BDR Passwords Mobility Fleet Tracking Patch Management Business Big Data Operating System Cost Management Cybercrime Mouse Refrigeration End of Support Analytics Financial Hard Drives Experience Vulnerabilities Infrastructure Break Fix Internet Exlporer Recovery Processors Two-factor Authentication How To Unified Communications Black Friday Storage Virtual Private Network Websites Safety Small Business Proactive IT Alerts Fun Money Identities Access Control Scam CIO Computer Care Presentation Administrator communications Training Gmail Techology Flexibility Cleaning Human Error Technology Laws Avoiding Downtime Vulnerability Undo Public Cloud Remote Computing Remote Workers Documents Digital Users Going Green User Scary Stories Superfish Buisness Typing IT Support Lithium-ion Battery Email Utility Computing Quick Tips IT Management Mobile Device Management Security Cameras Environment Data Breach Government Technology Tips Network Management Legal Managing Stress Computer Business Intelligence Mobile Device Managment Data Management Smartphone Antivirus Instant Messaging Hosted Solution Apps Data Security Computers Malware Motion Sickness Shortcut IT Support WiFi Employer-Employee Relationship Language USB Bitcoin IP Address Remote Monitoring Alert Solid State Drive Information Technology BYOD Windows 8 Managed IT services Augmented Reality Webcam Dark Web Modem Favorites Connectivity Communication Piracy Tech Term Smart Technology Cookies Spam Twitter Managed Service Zero-Day Threat Crowdsourcing Microsoft Excel Save Money Google Drive Laptop G Suite PowerPoint Printing Enterprise Resource Planning 5G Upgrade Fraud Automation Point of Sale Social Engineering Blockchain IT Budget Competition Bookmarks Remote Worker Backups Star Wars Physical Security Cyber Monday Software Tips Internet Analyitcs Maintenance Telephony Writing Bluetooth Virtualization Tech Support Cooperation Cameras Workplace Tips Mobile Security Deep Learning SaaS Innovation HIPAA Upgrades Android Mirgation Google Wallet Bandwidth Employees VoIP Employee-Employer Relationship Website Hacker WannaCry Personal Information Chromebook Health Servers

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code