Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Varieties of Smart Tech to Consider

Varieties of Smart Tech to Consider

How often do you see smart technology in headlines? The term is thrown around a lot, and it’s because there are countless products circulating in both the consumer and business environments. These connected devices range from smart forks to smart cars, so you can imagine that there are a fair number of useful (as well as useless) applications of this technology. How has it changed in recent months, and what will smart technology look like in the future?

Continue reading

Three Predictions for Technology in 2018

Three Predictions for Technology in 2018

With 2017 on its way out, there are many great technology solutions that businesses can take advantage of. Some of the most notable topics in business technology in recent years include business intelligence, artificial intelligence applications, and machine learning. What are some of the most important technologies that you’ll want to keep in mind for the 2018 business year?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Botnet IT solutions Business Intelligence LiFi Tech Support Data Breach G Suite Hiring/Firing Current Events Application Notes Legal Display Virtual Assistant Social Engineering Permission Automobile Financial Identity Theft Network Managed IT services Bookmarks Knowledge Save Money Automation Mirgation Solid State Drive The Internet of Things Computer Ransomware Virtual Desktop BDR Emoji Money Best Practices Network Security Recycling Theft Net Neutrality Digital Signature Lithium-ion Battery Sync Tip of the week Web Server Avoiding Downtime Business Owner Public Cloud Authentication Comparison Remote Computing App IBM Motherboard Intranet IT Support Password USB IoT Database Fun Google Paperless Office Connectivity Technology Tips Outlook Chromebook Content Filtering Disaster Budget Cache iPhone Touchscreen VoIP Tech Term Hacker Word Cleaning Redundancy Settings Mobile Blockchain Vulnerability Tracking Professional Services Upgrades Internet Internet of Things Cyberattacks Mobile Devices Mobility Taxes Chatbots Help Desk Scam Business Management PowerPoint Notifications Printer Firefox BYOD Downloads Storage Computers Internet Exlporer Two-factor Authentication IT Management How To Black Market Windows 10 Project Management Passwords Writing Human Error Mobile Security Software Tips Star Wars Mobile Device Regulations Google Maps Trending Server ROI Saving Money Hard Disk Drive Work/Life Balance Customer Service Data Recovery Favorites Communication Proactive Distributed Denial of Service IT Technicians Spyware Smartphone Virtualization Customer Relationship Management IT Services Halloween Refrigeration Authorization Cortana CIO Office 365 Finance Co-managed IT Big Data Shortcut Point of Sale Server Management Domains Gmail Mouse Phishing Techology Technology Patch Management Marketing History Electronic Medical Records Artificial Intelligence Virtual Reality Monitoring Private Cloud Virus Address 5G Superfish Cloud Computing Managed IT Proactive IT Administrator Cameras Augmented Reality OneNote Business Technology Wireless Undo Hacking Fraud Hard Drives Electronic Health Records Digital Managed IT Service Nanotechnology GPS Productivity Risk Management Error Unsupported Software Document Management Social Media YouTube Employer-Employee Relationship Assessment MSP Unified Threat Management Consultation Humor Enterprise Resource Planning Tablet Data Backup Network Management Cybercrime Staffing Virtual Private Network Backup and Disaster Recovery Bandwidth Update Buisness Break Fix Safety Microsoft Social Networking VoIP Company Culture Facebook Privacy Documents Files Public Speaking Computing Infrastructure Security Cameras Motion Sickness Unified Threat Management Running Cable Collaboration Typing Monitors Test Migration Cryptocurrency IT Budget Deep Learning File Sharing Sports Crowdsourcing Operating System Data Modem Voice over Internet Protocol Outsourced IT Cloud Quick Tips Legislation Statistics Office Tips Law Enforcement Staff Conferencing Windows 10 Utility Computing Politics Physical Security Managed Service Zero-Day Threat Website Computing Consumers Smartphones Samsung Telephone Systems Wi-Fi Twitter Information Remote Monitoring Multi-Factor Security HIPAA Disaster Resistance Read Only Meetings IT Consulting Cabling Android Microsoft Office High-Speed Internet Efficiency Heating/Cooling Windows Hacks Disaster Recovery Alt Codes How To Saving Time Bring Your Own Device Laptop Compliance Office Hard Drive IT Consultant Cookies Innovation Business Data Management Bluetooth Employee-Employer Relationship RMM Network Congestion Business Computing Screen Reader Flexibility Unified Communications Microsoft Excel CCTV Supercomputer Mobile Office Backups Uninterrupted Power Supply Data loss Language Apple Email Firewall Windows 7 Cost Management Consulting Troubleshooting Administration Going Green Data Warehousing Identities Users Small Business Spam User User Tips Websites Software as a Service Managed Services Provider Information Technology Operations Managed IT Services Employees communications Government Processors Entrepreneur Search IT service Mobile Data Chrome Router Hosted Solution Recovery Gadget Mail Merge WPA3 Experience Upgrade Digital Payment Analyitcs Wireless Technology WannaCry Hackers Best Practice Hotspot Procurement Wasting Time Bitcoin Piracy Permissions eWaste Black Friday Healthcare Retail Programming Time Management Maintenance Training Drones Miscellaneous Business Continuity Save Time Business Growth Management SaaS Personal Information Telephony Computer Repair Wearable Technology Scary Stories Computer Care Corporate Profile Malware Instant Messaging Google Calendar Gadgets Infrastructure Specifications Education Cables Windows 8 Cybersecurity Vendor Management Data Security Google Wallet Antivirus Mobile Device Managment Analytics Applications Mobile Computing Tech Terms Competition WiFi Google Drive Fleet Tracking Access Control Managed Service Provider Hosted Solutions Downtime Security SharePoint Remote Monitoring and Management User Error Hardware Servers Dark Web End of Support Phone System Software Encryption Asset Tracking Managing Stress Data storage Wires Technology Laws Features Productivity Alerts Health Networking Tip of the Week VPN Webcam Google Docs Travel Geography Mobile Device Management Backup Apps Cyber Monday Printing Development Browser PDF Smart Technology IT Support Lenovo Machine Learning Environment Cooperation Smart Tech IP Address E-Commerce Remote Worker 3D Printing Relocation Alert Robot Dark Data Workplace Tips Enterprise Content Management Social Identity Holiday Vulnerabilities Licensing Remote Workers Presentation

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...