Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Varieties of Smart Tech to Consider

Varieties of Smart Tech to Consider

How often do you see smart technology in headlines? The term is thrown around a lot, and it’s because there are countless products circulating in both the consumer and business environments. These connected devices range from smart forks to smart cars, so you can imagine that there are a fair number of useful (as well as useless) applications of this technology. How has it changed in recent months, and what will smart technology look like in the future?

Continue reading

Three Predictions for Technology in 2018

Three Predictions for Technology in 2018

With 2017 on its way out, there are many great technology solutions that businesses can take advantage of. Some of the most notable topics in business technology in recent years include business intelligence, artificial intelligence applications, and machine learning. What are some of the most important technologies that you’ll want to keep in mind for the 2018 business year?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Cleaning Cables OneNote Data Backup Identity Office 365 IBM Paperless Office Travel Downloads Telephony Corporate Profile Display Employee-Employer Relationship Outsourced IT Twitter Files Computer Care Cost Management Word Bitcoin Laptop WiFi Multi-Factor Security Malware Monitors Software Tips Employees Hardware SharePoint Instant Messaging Users Employer-Employee Relationship Websites Intranet HIPAA Augmented Reality Saving Time Cyber Monday Windows 10 Content Filtering Risk Management Language IT Support Remote Worker Comparison Redundancy Telephone Systems Smart Tech Password Security Cameras Fleet Tracking IT Management Cybercrime Miscellaneous Consumers IoT VoIP Meetings Public Cloud Remote Monitoring and Management Data Recovery Phone System End of Support Smartphones Maintenance Hard Disk Drive Network Security Bookmarks Alerts Analytics Staffing Cyberattacks Distributed Denial of Service Backups Motion Sickness Mobile Office E-Commerce Conferencing Cortana Dark Web Managing Stress Mail Merge Communication Business Owner Net Neutrality Wireless Technology YouTube Superfish Experience Spam SaaS Remote Computing Windows 8 Break Fix Motherboard Network Congestion Alt Codes Social Media VoIP IT Support Identity Theft Politics Migration Compliance Lithium-ion Battery Sync Mobile Devices Domains Authorization Hard Drive Automobile Cooperation Data Security Competition Email Budget USB Human Error Server Management Antivirus Applications Google Wallet Network Business Growth Smart Technology Work/Life Balance Notifications Managed Service Provider Digital Signature Passwords Undo Entrepreneur Unified Threat Management Hacking Utility Computing Web Server Humor Hacker Modem Virtual Private Network Law Enforcement Gadgets Geography Security Assessment Internet of Things Browser User Connectivity Fraud Remote Workers Google Vulnerability Relocation Mobile Computing Router Safety IT Consulting Private Cloud Microsoft Computing Infrastructure Tech Terms Backup Permissions Customer Service IT Budget Computer Google Docs Cloud Computing Regulations PowerPoint RMM Tip of the Week Productivity Printer Analyitcs Firefox Data Warehousing Statistics Access Control The Internet of Things Technology Tips Chromebook Network Management Cache IT Services Health BDR Electronic Health Records Procurement Enterprise Resource Planning Alert Wi-Fi Features Information Virus Efficiency Ransomware Halloween Managed IT Service Troubleshooting Collaboration MSP Asset Tracking Healthcare Microsoft Excel Information Technology VPN Mobile Device Managment Application Virtual Desktop Computing Encryption High-Speed Internet Flexibility Unsupported Software Proactive G Suite Retail Backup and Disaster Recovery Going Green 3D Printing Running Cable Mobile Cybersecurity WPA3 IT Consultant Business Management User Tips Tracking Finance Samsung Best Practice Authentication Innovation Tablet Machine Learning Licensing Virtual Reality Customer Relationship Management Data storage Gmail Cabling Read Only Google Calendar Technology Apps Patch Management Development Mirgation Unified Communications Software Networking Operations Mouse Time Management Education Managed Service Tech Term Trending Screen Reader Google Maps Internet Heating/Cooling Bring Your Own Device Tech Support Managed IT services Digital Consultation Website Project Management PDF Administration Upgrades Cloud Money iPhone Hotspot Firewall BYOD Virtualization Taxes App Co-managed IT Chrome Android Hackers Black Friday Two-factor Authentication Software as a Service Crowdsourcing File Sharing Programming Legal Monitoring Vulnerabilities Windows Servers Cookies Hosted Solutions Infrastructure Printing CIO communications Upgrade Mobility Artificial Intelligence Shortcut Financial Typing Legislation Downtime Buisness Data Sports Uninterrupted Power Supply Management Business Physical Security Test Small Business Theft Search Managed Services Provider Quick Tips Privacy Save Money Smartphone Vendor Management Operating System Cameras Proactive IT Cryptocurrency Automation Chatbots Computer Repair Lenovo LiFi Blockchain How To Scam Zero-Day Threat Administrator Apple Environment eWaste Managed IT Services Drones Social Engineering Consulting Mobile Device Management Favorites ROI Company Culture History Social Data Breach Deep Learning Processors Holiday Emoji Marketing Wearable Technology Save Time Black Market Google Drive Mobile Device User Error CCTV Botnet Solid State Drive Scary Stories Mobile Security Business Continuity Unified Threat Management Data loss Staff Technology Laws Star Wars Internet Exlporer Electronic Medical Records Mobile Data Disaster Outlook Disaster Resistance Social Networking Server How To IP Address Supercomputer Big Data Spyware Data Management Avoiding Downtime Settings Personal Information Computers Bluetooth Error Windows 10 WannaCry Hiring/Firing Business Intelligence Phishing Address Help Desk Writing Saving Money Office IT solutions Touchscreen Knowledge Presentation Public Speaking Office Tips Bandwidth Gadget Storage Digital Payment Hacks Point of Sale GPS Identities Government Refrigeration Update Business Computing Microsoft Office Recycling Training Specifications Enterprise Content Management Hosted Solution Robot Business Technology Disaster Recovery Document Management Hard Drives Wireless Wires Dark Data Productivity Best Practices Facebook Remote Monitoring Webcam 5G Workplace Tips IT Technicians Documents Fun Tip of the week Techology Recovery IT service Permission Nanotechnology Current Events Piracy Managed IT

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...