Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Top 5 Smartphones For You Heading Into 2019

The Top 5 Smartphones For You Heading Into 2019

With the smartphone market losing ground for the first time in its short history, many of the manufacturers you’ve come to know are either non-factors in the current market, or don’t even produce smartphones anymore. With new demand growing every year, new manufacturers such as OnePlus and Xiaomi are primed to fall in line behind Samsung and Apple.

Continue reading
0 Comments

Tech Term: Mobile Device Management

Tech Term: Mobile Device Management

While smartphones and tablets can help businesses quite a bit, they can also be quite detrimental to their success. If you can get past the issues related to employees bringing their own devices to the workplace, then you’ll be able to save a considerable amount of time and resources on device procurement, but you certainly want to make sure you have a mobile device management policy put in place first.

Continue reading
0 Comments

Have Any of These New Phones Made It on to Your Wish List?

Have Any of These New Phones Made It on to Your Wish List?

The new smartphone models are here. This year there are plenty for consumers to get excited about in the smartphone space. The return of the Galaxy Note, the evolution of the Galaxy s8, a premium iPhone, and the return of two of the industry's heavy hitters highlight this year’s best smartphones.

Continue reading
0 Comments

Why Hasn’t Mobile Payment Really Taken Off?

Why Hasn’t Mobile Payment Really Taken Off?

Digital payment options have become commonplace in today’s society. In fact, ever since people could purchase goods and services off of the Internet, some of the world’s most successful companies are a result of digital payment. It was a natural progression then, as the mobile device boom came, that mobile payment would take the place of cash and/or cards and bring these digital payment options beyond the Internet, and into our retail stores. This simply hasn’t happened and here are four reasons why.

Continue reading
0 Comments

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

Continue reading
0 Comments

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

Continue reading
0 Comments

The Top 5 Smartphones on the Market Today, Vol. 1

b2ap3_thumbnail_smartphone_version_one_400.jpgYears before Steve Jobs stood up on the stage in San Francisco and proclaimed Apple had brought you the future, the future he spoke of was already being developed, and in some cases utilized already by millions of people around the world. Cellular phone technology had been around for some time by 2007, but the iPhone, set in motion a mobile revolution.

Continue reading
0 Comments

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

Continue reading
0 Comments

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Smartphones Call For Smart Security

b2ap3_thumbnail_smartphone_security_400.jpgWe always talk about protecting your computers and servers from outside threats, but what about protecting your smartphones? There isn’t much difference between a smartphone and a computer. They both function in very similar ways with access to a variety of apps, social media, and browsers. Your smartphone could hold much more valuable data than just contacts or text messages.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Humor Robot Education End of Support Chatbots High-Speed Internet Flexibility Fun SharePoint Apps Processors Mail Merge Net Neutrality Cookies Downtime Cyberattacks Outlook Migration Scam Microsoft Office Connectivity Computer Repair Data loss Regulations communications Mobile Hackers Holiday PowerPoint Employees Saving Money Point of Sale Superfish Managed Service Public Speaking How To Google SaaS Search Digital Signature How To Redundancy Web Server Email Drones Windows 10 Data Security Management Project Management Best Practice Recovery 3D Printing Big Data Spam Password Avoiding Downtime Computing Troubleshooting Phishing Utility Computing Alerts Scary Stories User Tips IT Budget Office Google Drive Cortana Word Miscellaneous Wi-Fi Lithium-ion Battery Electronic Medical Records Google Wallet Mobile Device Management Cost Management Techology Company Culture Address Administrator Laptop Smart Tech Mobile Computing Mobile Devices Risk Management Upgrade Hard Drives Maintenance Computers Backups Software Motherboard History Piracy Favorites Going Green Environment Cooperation Tablet Google Docs 5G File Sharing Paperless Office RMM Mobile Device Managment Remote Monitoring Hacking Hacks Administration Procurement Technology Tips Trending Smartphone Infrastructure Access Control IT Services Applications Best Practices Website Botnet Assessment WPA3 Customer Service Office Tips LiFi Unified Communications Business Intelligence Halloween Information Mobile Device Cloud Domains IT solutions Specifications Motion Sickness Antivirus Time Management Tech Terms Business Continuity Test Instant Messaging Public Cloud Collaboration Websites Augmented Reality Phone System Managed IT services Encryption Tip of the Week Business Growth Co-managed IT Internet Mirgation Content Filtering Physical Security Staffing Windows Spyware Office 365 Settings Retail Documents Networking Multi-Factor Security Files Zero-Day Threat Malware Customer Relationship Management Legal Technology Gadgets Intranet HIPAA Health Hosted Solutions Servers IT Support Data Management Computer Care Consulting Permissions Outsourced IT Firefox Healthcare Data Warehousing Managed Services Provider Social Engineering Software as a Service Politics Proactive IT Emoji Productivity Proactive Analyitcs Legislation Employer-Employee Relationship Display Privacy Dark Web Managed IT Hardware Internet Exlporer Android Taxes Small Business Language Server Mobile Office Two-factor Authentication Comparison Artificial Intelligence E-Commerce Virtual Reality Business Technology Authorization Facebook Microsoft IT Consulting Experience Hacker IT Consultant Fleet Tracking Automation Training Google Calendar Money Data Bookmarks Remote Workers Passwords MSP Monitoring Monitors Conferencing Law Enforcement Productivity Managing Stress Application Network Congestion Personal Information Update Distributed Denial of Service Remote Monitoring and Management Theft Fraud Operations BYOD Webcam CCTV Safety Innovation Communication Digital Payment Crowdsourcing Compliance Employee-Employer Relationship Work/Life Balance Meetings OneNote Twitter Printing Patch Management Finance Tracking Cryptocurrency Workplace Tips Hard Drive Cybercrime Hiring/Firing Gadget Quick Tips Vendor Management Digital VoIP Save Money Tech Term IP Address Social WiFi Bring Your Own Device IBM Black Market Users Telephone Systems IT Support Touchscreen Supercomputer Google Maps Identity Electronic Health Records Analytics Business Owner Writing Bluetooth Printer Dark Data Internet of Things Managed IT Service Backup Sports Read Only BDR Business Human Error G Suite IoT USB Managed Service Provider Virtual Private Network Lenovo Smart Technology Microsoft Excel Recycling Development Server Management Wireless Technology Help Desk Buisness Security Cameras Deep Learning Typing Network Security Budget Windows 8 Social Media Bandwidth Cache Storage Remote Worker Unsupported Software Automobile iPhone Current Events Operating System Network User Disaster Recovery Save Time Cabling Wireless Business Management eWaste Star Wars Virtual Desktop Apple Hard Disk Drive YouTube Windows 10 Firewall Blockchain Error Knowledge VoIP Efficiency Data storage Competition Computing Infrastructure Cameras Downloads App Ransomware Sync Cables Geography Refrigeration Vulnerability Alert Technology Laws Samsung Corporate Profile Disaster CIO Unified Threat Management Upgrades Wearable Technology Authentication Nanotechnology Cybersecurity Asset Tracking Mouse Identity Theft Cyber Monday The Internet of Things Document Management Undo Presentation Unified Threat Management Consultation Telephony Solid State Drive Government Hosted Solution Smartphones Heating/Cooling Programming Running Cable Consumers Uninterrupted Power Supply Computer Business Computing Marketing Cloud Computing GPS Features Hotspot Statistics ROI Virtualization Backup and Disaster Recovery IT Technicians Information Technology IT service Staff Alt Codes Mobility Mobile Data PDF Remote Computing Identities Network Management VPN Saving Time Disaster Resistance Software Tips Wires Entrepreneur Vulnerabilities Screen Reader Relocation Data Breach Chrome Private Cloud IT Management Managed IT Services Machine Learning Chromebook Shortcut Security Notifications Router Social Networking User Error Black Friday Modem Data Recovery Tip of the week Tech Support Gmail Bitcoin Enterprise Content Management Permission WannaCry Cleaning Financial Licensing Data Backup Break Fix Mobile Security Virus Enterprise Resource Planning Travel Browser

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code