Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft SQL Server 2008 Approaching End of Life

Microsoft SQL Server 2008 Approaching End of Life

Microsoft is the world’s most profitable software company, and if your business is like any of the millions of businesses that rely on Microsoft’s servers, you know they are both useful and secure. Occasionally, however, Microsoft will retire older software titles as they need constant care and support. On July 9, 2019, Microsoft will officially retire their SQL Server 2008 and SQL Server 2008 R2 operating systems. If your organization still uses this software there is no time like the present to get you systems updated, as losing support will be a major problem.

Continue reading
0 Comments

Understanding the Basics of Server Maintenance

Understanding the Basics of Server Maintenance

Server units--you’ll find them in most offices out there, but they are all used for different purposes. Since well-maintained data is so essential to the success of many organizations, it’s important to keep your server units in proper working order. Today we’ll discuss the best ways to make sure your servers are in peak performance.

Continue reading
0 Comments

Tech Term: An Introduction to Proxy Servers

Tech Term: An Introduction to Proxy Servers

There are plenty of technical terms and solutions that, while heard of frequently enough, it may not be completely clear what they mean or refer to. A proxy server is an excellent example of such a solution. This week, we’ll examine this tech term and review how utilizing proxy servers can help your business.

Continue reading
0 Comments

Tip of the Week: Choosing the Right Storage for Your Business

Tip of the Week: Choosing the Right Storage for Your Business

Regardless of where it is kept, your data’s security is of paramount importance. However, this doesn’t mean that the decision between leveraging the cloud or an on-premise server for your data storage needs isn’t an important one. For this week’s tip, we’ll weigh these options against each other to help you establish which is the better option for your business’ needs.

Continue reading
0 Comments

Make the Most of Your Data Migration

Make the Most of Your Data Migration

Data migration is a sizable task. There’s plenty that could go wrong as you move your data from one server to another solution. As you transfer your data, it helps to keep a few considerations in mind to ensure the process goes smoothly while getting the biggest benefit from the time it takes you.

Continue reading
0 Comments

Tip of the Week: Optimize Your Computer By Taking Care of the Clutter

Tip of the Week: Optimize Your Computer By Taking Care of the Clutter

Do you remember the day that you purchased your current workstation? Maybe it was last week, last month, last year, or several years ago. At one point, it was pristine, untouched by the demands of the workday, but those days have long since passed. Over time, your computer collects all sorts of stuff on it, from unnecessary files to outdated, unused software.

Continue reading
0 Comments

Things That Go Bump in the Server Closet

b2ap3_thumbnail_spooky_technology_400.jpgHalloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodcurdling screams are enough to make you want to run and hide. Yet, there’s one sound that’s the most terrifying of them all, and it’s coming from your server room!

Continue reading
0 Comments

Don’t Let Underutilized Servers Hold Your Business Back

b2ap3_thumbnail_server_utilization_400.jpgHow messy is your server room? When was the last time you took note of how many machines you have, and what each of them are contributing to your business’s goals? If either of these situations sound familiar, it might be time to take a closer look at your technology and examine how you can improve operations. One of the best ways you can do so is by eliminating unnecessary costs from unused and underutilized servers.

Continue reading
0 Comments

How to Properly Store a Hard Drive

b2ap3_thumbnail_frozen_hard_drive_400.jpgWhat’s the best way to preserve your important files for years to come? Questions like this are being asked more frequently in our data-driven society. Here are some best practices when it comes to long-term data storage.

Continue reading
0 Comments

When it’s Hot Outside, Your Servers Are Burning Up Inside

b2ap3_thumbnail_ac_units_cool_servers_400.jpgIf you host your own servers in-house, or in an off-site data center, you know all about the frustrations of keeping your hardware up to date and healthy. This also includes keeping your servers from overheating. These mission-critical pieces of hardware are known to produce incredulous amounts of heat, and keeping them cool only gets more challenging during hot, sticky summer months.

Continue reading
0 Comments

Windows Server 2003 Support Ends this July

b2ap3_thumbnail_server_operating_system_losing_support_400.jpgJuly 14th is an important date in the business technology world. Why? Because it’s a major landmark for users of Windows Server 2003. In just a few short months, Microsoft will no longer support this decade-old server operating system. Therefore, you must take steps to upgrade away from this server OS before it’s too late.

Continue reading
0 Comments

How Secure Are Your Virtual Servers?

b2ap3_thumbnail_hosted_server_400.jpgIn today's technology world, a lot of businesses are opting to take advantage of virtualized servers. These offer various benefits, including the ability to consolidate your servers into a neat, controlled package. But according to a recent study by Symantec, virtual servers might not be as secure as once thought. In fact, they might not be any more secure than a physical server.

Continue reading
0 Comments

Ghost Servers - Who Ya Gonna Call?

b2ap3_thumbnail_ghost_server_400.jpgEveryone has heard horror stories about the spirits of the dead lingering in this world. Every culture on this planet has different beliefs about the nature of these spectral beings. Not much is known about these beings, but people still believe without a doubt that they exist. In regards to technology, ghosts do exist, in the form of ghost servers.

Continue reading
0 Comments

Tip of the Week: How to Reorganize Your IT Infrastructure

b2ap3_thumbnail_get_your_it_in_order_400.jpgEveryone needs a tip occasionally. Therefore, we want to provide our followers with what we like to call, "Tips of the Week." These helpful tidbits are targeted toward helping you understand certain aspects of business technology. For our first tip, we will walk you through how to reorganize your IT infrastructure. For more tips, see our previous blog articles.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Vulnerability Computer Tech Support Office 365 Ransomware Data Backup Mobile Computing Hard Drives Firewall Analytics IoT Business Computing Mobility Webcam Financial Safety Budget Big Data Internet Exlporer Windows 7 Buisness Help Desk Network Management Security Printer Backups Procurement OneNote Point of Sale 5G User Maintenance Automation Unsupported Software Dark Data Public Cloud IT service Word Mobile Data Managed Service Redundancy Mirgation Scary Stories Staff Privacy Features Cables Identities Conferencing Sync Office Tips Tech Term GPS LiFi Network Security Virtual Assistant Wires Multi-Factor Security Lithium-ion Battery Smart Tech Printing Workplace Tips End of Support Antivirus HIPAA Break Fix Paperless Office Blockchain Tech Terms Emoji Save Money Voice over Internet Protocol CCTV Public Speaking Health Alert CIO PDF Mobile Mobile Device Managment Digital Signature Wearable Technology Deep Learning Gmail Hosted Solutions Vendor Management Hiring/Firing Wireless Vulnerabilities Consulting Cortana Social Media Authentication Security Cameras Zero-Day Threat Bluetooth IBM Malware IT Technicians BDR High-Speed Internet Information Technology iPhone Bitcoin Migration Patch Management Running Cable Remote Monitoring and Management Storage Hacks Address IT Management Customer Service Quick Tips Data loss Managing Stress Digital G Suite Information Social Black Market Project Management Software Unified Threat Management Troubleshooting Laptop Money Processors Assessment Human Error Recycling Tracking Productivity Internet Email Knowledge Lenovo Company Culture Telephony Business Technology Google Drive Business Save Time Display Private Cloud Artificial Intelligence Licensing Shortcut Piracy Google Chromebook Tip of the week Chrome Time Management MSP Server Management Notifications Specifications Utility Computing Hardware Smart Technology Data Saving Time Hard Drive Compliance Google Docs Development Cache Managed IT Service Corporate Profile Work/Life Balance Cloud Computing Humor Users Government Halloween Microsoft Excel Windows 8 Mouse Outsourced IT Backup and Disaster Recovery Employer-Employee Relationship Data storage Monitoring IT Budget Experience Software as a Service Phone System Tablet Samsung Analyitcs Physical Security WPA3 File Sharing Computer Care Personal Information Administrator Virtual Reality Robot Applications Bring Your Own Device Mobile Devices Hacking Management Managed IT Services Firefox Digital Payment Upgrade Downloads Augmented Reality Cabling Cooperation Enterprise Resource Planning IT solutions Recovery Cleaning Environment Cookies Training IT Consulting Motion Sickness Data Management Files Flexibility Cryptocurrency Best Practices Writing Spyware Authorization Marketing Data Warehousing Office Unified Threat Management Bandwidth Microsoft Efficiency Test Enterprise Content Management Employees Professional Services Two-factor Authentication Remote Worker Customer Relationship Management Access Control Operating System Read Only Cyber Monday Communication Small Business Modem Saving Money Cybercrime Managed IT services Competition WannaCry Networking Disaster Resistance Motherboard Update VoIP Electronic Health Records Going Green Collaboration Computing Passwords Sports Finance Taxes Electronic Medical Records Hackers Identity Theft Router Wi-Fi Social Networking Co-managed IT Alt Codes User Tips Asset Tracking History Outlook App Theft SharePoint Bookmarks Computing Infrastructure Risk Management IT Support 3D Printing Distributed Denial of Service Politics Gadget Fleet Tracking Business Intelligence ROI Content Filtering Hard Disk Drive Touchscreen Spam Windows 10 Staffing Travel Search Machine Learning Network Current Events Black Friday Business Growth Google Calendar Wasting Time communications Computers BYOD Facebook Network Congestion Superfish Techology IP Address VPN Database Twitter Website Screen Reader Servers Language Hacker IT Services Virtualization Programming Statistics The Internet of Things YouTube Regulations Domains Remote Monitoring USB Hosted Solution Smartphones Business Continuity Business Management Productivity Innovation Cost Management WiFi Apps E-Commerce Favorites Administration Hotspot Disaster Recovery Dark Web Refrigeration Best Practice Holiday VoIP Automobile Uninterrupted Power Supply Consumers Error Drones Server Unified Communications Settings Comparison IT Consultant Google Wallet Upgrades Cameras Android Proactive IT Net Neutrality Geography Cyberattacks Virus Data Breach Mobile Security Mobile Device Management Mobile Office Fun Technology Solid State Drive Virtual Private Network Education Permission Data Security Crowdsourcing Intranet Managed Services Provider Identity Legislation Law Enforcement Avoiding Downtime Cloud Application Connectivity Undo Notes Alerts Social Engineering Healthcare Miscellaneous RMM Tip of the Week Document Management Telephone Systems Presentation Legal Microsoft Office Entrepreneur How To Gadgets Consultation Technology Laws IT Support Managed IT Mail Merge Documents Infrastructure Nanotechnology Typing SaaS Remote Computing Encryption Permissions Proactive Business Owner Monitors Disaster Heating/Cooling Fraud Scam Instant Messaging Botnet How To User Error Mobile Device Relocation Apple Remote Workers Browser Cybersecurity eWaste Meetings Password Windows 10 Web Server Data Recovery Managed Service Provider Star Wars Virtual Desktop Employee-Employer Relationship Google Maps Operations Technology Tips Smartphone Backup Windows Chatbots Wireless Technology Trending Phishing Computer Repair Downtime PowerPoint Supercomputer Retail Software Tips Websites Internet of Things

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code