Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Professional Football Teams Use Virtual Reality to Prepare for the Season

Professional Football Teams Use Virtual Reality to Prepare for the Season

Football season is upon us, and the National Football League is filled to the brim with teams that want to make this year the one in which they win it all. In order to get the competitive edge, many teams are turning to virtual reality training, which has proven to be quite effective in preparation for on-the-field practice.

Continue reading

Professional Sports Add The Internet of Things to the Playbook

b2ap3_thumbnail_nfl_iot_400.jpgThere are those in the technology world that argue that professional sports are of marginal importance. Grown men and women, getting paid vast sums of money by fat-cats that make the average successful business owner look like a pauper, to play games that millions of children play everyday. However, according to a poll taken by CNN/USA Today/Gallup, nearly two-thirds of American respondents admitted to being sports fans. In other nations around the world, the sports that fans follow may differ, but percentages are similar to, or exceed those in the U.S.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Backup Hosted Solutions Electronic Medical Records Writing Antivirus IT solutions Data Security Consumers Big Data Upgrades Managed Service Provider Recovery IT Consultant MSP Recycling Private Cloud Touchscreen Buisness Sports Outlook Management Identity Cyber Monday IT Technicians Smartphone Theft Features Smart Technology Data IT Budget Wireless Smart Tech Cameras The Internet of Things Licensing 3D Printing Hacks Paperless Office Refrigeration Technology Tips Cost Management Document Management Downtime Gmail Procurement Technology Miscellaneous Cooperation Storage Apple Applications Twitter Automation Bring Your Own Device Office 365 Training Humor Telephone Systems Hotspot Alert USB Modem Mobile Device Managment How To Wi-Fi Efficiency Motherboard VoIP IT Support Gadget Knowledge Disaster Resistance Address Travel Content Filtering Innovation Corporate Profile Data Backup Office Unsupported Software Bandwidth Maintenance IT Consulting SharePoint Human Error Internet Spyware Assessment Managed Services Provider Notifications Telephony Settings Domains Public Speaking Managed IT Web Server Productivity Virtual Desktop Business Intelligence Machine Learning Google Wallet Social Media Chrome Facebook Lithium-ion Battery Tip of the Week Encryption Scam Personal Information Patch Management Programming Cloud Computing 5G Update Staff PDF Hackers Typing User Error Firewall Managed IT Services Cryptocurrency Heating/Cooling Computer Care Politics Bitcoin Law Enforcement Retail Social PowerPoint IBM Money Proactive IT Artificial Intelligence Email Computing Virtualization Techology Chromebook Vulnerability Halloween Wires Network Congestion Wireless Technology Comparison Cables History Browser Website Search Asset Tracking Crowdsourcing Google Maps Printing Authorization Cybercrime Unified Threat Management Troubleshooting Network Competition Quick Tips Servers Connectivity Undo Samsung Websites Employee-Employer Relationship Operating System Spam Government Finance Productivity Black Market Safety IT Support Digital Payment Staffing G Suite Backups Employer-Employee Relationship Bookmarks Password Star Wars Screen Reader Fleet Tracking Word Hosted Solution Technology Laws User Intranet Net Neutrality Unified Communications Administration iPhone Fun Digital App Cortana Sync Automobile Cybersecurity Software as a Service Favorites eWaste Data Warehousing Application Company Culture Mobile Device Digital Signature Education Customer Relationship Management Uninterrupted Power Supply Network Security Cabling Collaboration Going Green OneNote Remote Worker Blockchain Internet Exlporer Piracy Social Engineering Permissions Dark Data Windows 10 Operations Scary Stories Documents Alerts Motion Sickness Help Desk Flexibility Marketing Alt Codes Identity Theft Monitors Trending Budget Test WiFi Relocation Conferencing Time Management Black Friday Computer Router Error User Tips Analyitcs Saving Time Windows 10 Tech Terms How To Customer Service Running Cable Break Fix Gadgets Holiday Cache Redundancy Shortcut Best Practices communications Chatbots Nanotechnology Computer Repair YouTube IT Services Cleaning LiFi Hacker Managed IT services IP Address Read Only Data loss Experience Mobile Security Specifications Utility Computing CIO Health Privacy Analytics Current Events Software Tips IT Management Windows Phone System Data Management Outsourced IT Remote Computing RMM Monitoring Google Docs Healthcare Unified Threat Management Point of Sale Software Deep Learning IoT Supercomputer Google Calendar Language Passwords Apps Superfish Google Cloud VoIP Remote Workers Computers Tracking Upgrade Enterprise Content Management Wearable Technology Mail Merge Managed IT Service Ransomware Project Management File Sharing Compliance Users Administrator Robot E-Commerce Tech Support Development Downloads Best Practice Internet of Things Multi-Factor Security Two-factor Authentication Malware Google Drive Android Office Tips Statistics SaaS Taxes Mobility Co-managed IT Server Management Avoiding Downtime Mobile Devices Solid State Drive Zero-Day Threat Enterprise Resource Planning Authentication Permission Save Time Tech Term Microsoft Networking Identities Virus Fraud Hard Drive Access Control Managed Service Data Recovery Mobile Device Management Financial Mobile Computing Disaster ROI Hard Disk Drive Bluetooth Cyberattacks Microsoft Excel Security Information Technology Botnet Geography Regulations Business Growth Emoji Risk Management Business Computing Mouse Hiring/Firing WannaCry Smartphones Work/Life Balance Security Cameras Hardware Migration Virtual Reality WPA3 Laptop Mobile Data Cookies Hard Drives Electronic Health Records Files Webcam Business Distributed Denial of Service Mobile Office Augmented Reality BDR Remote Monitoring Proactive BYOD Drones Saving Money Data storage Phishing Business Owner Communication HIPAA Save Money Small Business Disaster Recovery Meetings Infrastructure Hacking Remote Monitoring and Management Lenovo GPS Workplace Tips Mirgation Mobile Physical Security CCTV Legislation Vendor Management Legal Consultation Managing Stress Data Breach Server Business Management Vulnerabilities Environment Entrepreneur Display IT service Social Networking Tablet Instant Messaging Employees Consulting Printer Backup and Disaster Recovery Business Continuity Firefox Business Technology Presentation Processors Information End of Support Microsoft Office Dark Web Tip of the week VPN High-Speed Internet Virtual Private Network Public Cloud Windows 8 Network Management Computing Infrastructure

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...