Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Top 5 Smartphones For You Heading Into 2019

The Top 5 Smartphones For You Heading Into 2019

With the smartphone market losing ground for the first time in its short history, many of the manufacturers you’ve come to know are either non-factors in the current market, or don’t even produce smartphones anymore. With new demand growing every year, new manufacturers such as OnePlus and Xiaomi are primed to fall in line behind Samsung and Apple.

Continue reading
0 Comments

Tech Term: Mobile Device Management

Tech Term: Mobile Device Management

While smartphones and tablets can help businesses quite a bit, they can also be quite detrimental to their success. If you can get past the issues related to employees bringing their own devices to the workplace, then you’ll be able to save a considerable amount of time and resources on device procurement, but you certainly want to make sure you have a mobile device management policy put in place first.

Continue reading
0 Comments

Have Any of These New Phones Made It on to Your Wish List?

Have Any of These New Phones Made It on to Your Wish List?

The new smartphone models are here. This year there are plenty for consumers to get excited about in the smartphone space. The return of the Galaxy Note, the evolution of the Galaxy s8, a premium iPhone, and the return of two of the industry's heavy hitters highlight this year’s best smartphones.

Continue reading
0 Comments

Why Hasn’t Mobile Payment Really Taken Off?

Why Hasn’t Mobile Payment Really Taken Off?

Digital payment options have become commonplace in today’s society. In fact, ever since people could purchase goods and services off of the Internet, some of the world’s most successful companies are a result of digital payment. It was a natural progression then, as the mobile device boom came, that mobile payment would take the place of cash and/or cards and bring these digital payment options beyond the Internet, and into our retail stores. This simply hasn’t happened and here are four reasons why.

Continue reading
0 Comments

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

Continue reading
0 Comments

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

Continue reading
0 Comments

The Top 5 Smartphones on the Market Today, Vol. 1

b2ap3_thumbnail_smartphone_version_one_400.jpgYears before Steve Jobs stood up on the stage in San Francisco and proclaimed Apple had brought you the future, the future he spoke of was already being developed, and in some cases utilized already by millions of people around the world. Cellular phone technology had been around for some time by 2007, but the iPhone, set in motion a mobile revolution.

Continue reading
0 Comments

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

Continue reading
0 Comments

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Smartphones Call For Smart Security

b2ap3_thumbnail_smartphone_security_400.jpgWe always talk about protecting your computers and servers from outside threats, but what about protecting your smartphones? There isn’t much difference between a smartphone and a computer. They both function in very similar ways with access to a variety of apps, social media, and browsers. Your smartphone could hold much more valuable data than just contacts or text messages.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Wearable Technology Consultation Remote Worker Chatbots Fraud Emoji Downloads Data Breach Features Travel Heating/Cooling Specifications Business Growth Tip of the Week IT Support 3D Printing Break Fix Black Friday Mobile Security Office Tips Software Tips Asset Tracking Mobile Device Hard Drive Phone System Current Events Servers Botnet IT Consultant Computer Refrigeration Chromebook YouTube Email WannaCry Point of Sale Unified Communications Operations Digital Signature Redundancy Vulnerability Blockchain Fleet Tracking Human Error Lithium-ion Battery Remote Computing Solid State Drive Buisness Touchscreen Big Data Identities Holiday Digital Payment Two-factor Authentication Network Upgrade Business Technology Government Computing IT Support Artificial Intelligence Patch Management Social Media Administration Hosted Solutions Wireless Technology Content Filtering Virtualization Internet of Things Maintenance Google Maps Identity Electronic Medical Records Cyber Monday Data Recovery Disaster User Error Geography Conferencing 5G Virtual Reality Supercomputer Google Wallet Co-managed IT Unified Threat Management Mobile Data Data storage Deep Learning Error Cloud Computing Backups Mirgation Consumers Windows 8 Cookies Cryptocurrency Managing Stress Legal Identity Theft Users Internet Exlporer How To Administrator Screen Reader Electronic Health Records Language Test Laptop Scam Paperless Office WiFi Dark Web Downtime Healthcare Router IBM Google Drive Customer Relationship Management Browser Unsupported Software Compliance Running Cable Firewall Mobile Gmail Scary Stories Safety Disaster Recovery Telephone Systems Cooperation Microsoft Office Programming VoIP Theft Unified Threat Management Vulnerabilities Writing IP Address Firefox Flexibility Storage Managed Service Microsoft Hard Drives Employer-Employee Relationship Word Printing Password Knowledge Network Congestion Money Operating System Customer Service Technology Tips Search Computer Care Information IT service Black Market Business Computing Communication IT solutions Meetings Professional Services Environment ROI Cameras Business Continuity Security Cameras Business Owner Notes Business Web Server Recycling OneNote Hacking Tech Terms Competition Going Green Undo Cybercrime Distributed Denial of Service Cortana Motherboard IoT Processors Wi-Fi G Suite Digital Proactive IT Windows 7 Company Culture iPhone Software as a Service Intranet Ransomware Virtual Assistant Networking Procurement Mobile Device Managment Network Security PowerPoint Shortcut Avoiding Downtime Hacks Star Wars Google Website Google Docs Encryption Relocation Passwords Business Intelligence Virtual Private Network Education Address Sports Robot Display Data Security Computers PDF Utility Computing VoIP Access Control Fun Management Facebook Bring Your Own Device Alert MSP Wireless Outlook CCTV Mobile Office Hacker Authorization Taxes Cables Motion Sickness SharePoint Server Management Files Smart Technology Favorites Documents Cyberattacks Small Business Managed Services Provider Politics Cabling communications Crowdsourcing Applications Recovery Training Piracy Managed IT Service Infrastructure Notifications History Dark Data Data IT Services Instant Messaging Zero-Day Threat Time Management Hackers Save Money Regulations Tech Support Cost Management Security Project Management Halloween Marketing Managed IT Mobile Device Management User Data Warehousing Telephony Microsoft Excel CIO Update Assessment Computer Repair Printer Statistics Presentation Tip of the week Hard Disk Drive How To BDR Gadget Outsourced IT Best Practice Social Networking Chrome Tablet Hotspot Machine Learning Employees Mobility Server Risk Management LiFi Backup Troubleshooting Data Backup Experience Social Migration Software App Internet Data Management Proactive Wasting Time Cache Permission Efficiency Cybersecurity USB Analyitcs Smartphones Mouse IT Technicians Social Engineering Remote Monitoring and Management Monitors Trending Financial Augmented Reality Public Cloud Managed IT services Quick Tips Humor Saving Money Technology Laws Cloud RMM E-Commerce IT Budget High-Speed Internet Development Database Mobile Computing Application Apple Websites Alerts Analytics Lenovo Wires Staffing Google Calendar Techology Apps Managed IT Services The Internet of Things Remote Monitoring Permissions Information Technology Windows Phishing Webcam Innovation Public Speaking Private Cloud Vendor Management Sync Comparison Bluetooth Net Neutrality Save Time Antivirus Miscellaneous Uninterrupted Power Supply Health User Tips Upgrades Domains Consulting Personal Information Malware Samsung Android Virtual Desktop Voice over Internet Protocol Help Desk Connectivity Technology End of Support Settings Productivity Work/Life Balance Licensing Multi-Factor Security Entrepreneur Enterprise Content Management Mail Merge Law Enforcement File Sharing Smart Tech Saving Time Legislation Computing Infrastructure Windows 10 Managed Service Provider VPN Virus Bookmarks Workplace Tips Spyware Corporate Profile IT Management Staff Superfish Modem Smartphone Disaster Resistance Automobile Gadgets Collaboration Productivity Office 365 Backup and Disaster Recovery Bitcoin Authentication Document Management Office Privacy Bandwidth Retail Finance Automation IT Consulting Physical Security HIPAA Hosted Solution Budget Nanotechnology Business Management Read Only eWaste Best Practices GPS Data loss Enterprise Resource Planning Spam BYOD Tracking Remote Workers Drones Network Management Hardware Windows 10 Hiring/Firing Typing WPA3 Cleaning Monitoring Tech Term Mobile Devices Twitter SaaS Alt Codes Employee-Employer Relationship

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code