Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Professional Football Teams Use Virtual Reality to Prepare for the Season

Professional Football Teams Use Virtual Reality to Prepare for the Season

Football season is upon us, and the National Football League is filled to the brim with teams that want to make this year the one in which they win it all. In order to get the competitive edge, many teams are turning to virtual reality training, which has proven to be quite effective in preparation for on-the-field practice.

Continue reading

Professional Sports Add The Internet of Things to the Playbook

b2ap3_thumbnail_nfl_iot_400.jpgThere are those in the technology world that argue that professional sports are of marginal importance. Grown men and women, getting paid vast sums of money by fat-cats that make the average successful business owner look like a pauper, to play games that millions of children play everyday. However, according to a poll taken by CNN/USA Today/Gallup, nearly two-thirds of American respondents admitted to being sports fans. In other nations around the world, the sports that fans follow may differ, but percentages are similar to, or exceed those in the U.S.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Gmail Proactive IT Google Wallet Error Cost Management Save Money Internet of Things Retail Networking Proactive Maintenance Social Outlook Cookies BDR Solid State Drive Risk Management Data Warehousing Business Gadget Social Media Office Tips Favorites Search 3D Printing Customer Relationship Management Windows Remote Monitoring Small Business Managed Service Phone System Document Management Network Congestion Two-factor Authentication eWaste Users Tip of the Week Consumers Alt Codes Legislation Tip of the week IT Support Automation Competition Staff Technology Laws Data Mobile Devices Managed IT IT solutions Bring Your Own Device Servers Physical Security LiFi Tablet Upgrade Software Tips Cloud Computing Fraud Permissions Cloud Mouse IT service Business Growth Unified Threat Management VoIP Legal Health Travel Dark Web Wearable Technology Law Enforcement Telephone Systems Government Disaster Resistance Star Wars Android Distributed Denial of Service Collaboration Vulnerabilities OneNote Language Mobile Computing Fleet Tracking Dark Data IP Address Typing Windows 10 Education Digital Word Network Security Google Maps Halloween Printing Business Continuity Professional Services Time Management Social Engineering File Sharing Documents Update Microsoft Excel Customer Service Gadgets Conferencing Operations Humor Network Procurement Remote Computing Staffing Facebook Business Computing Managed IT Services Electronic Medical Records Licensing Supercomputer Net Neutrality IT Support Consulting Data Backup Statistics WiFi Operating System Public Cloud Password Managed IT Service Website Social Networking Cameras Apps Motion Sickness Paperless Office IoT Tech Term Computer Care Bluetooth Web Server Business Intelligence Information Twitter Mobile Device Management Hosted Solutions Quick Tips Business Owner Project Management Utility Computing Employee-Employer Relationship Finance Digital Payment E-Commerce Data Breach WPA3 Programming Passwords Shortcut Chrome Database User Tips Trending Virtual Desktop Wires CCTV Hosted Solution Microsoft Features Office 365 Ransomware Hacking Chatbots Printer Management Drones Bitcoin Digital Signature Virus User Error Computing Hotspot Downloads Cabling Corporate Profile G Suite Cortana Mirgation Touchscreen Financial Zero-Day Threat Managing Stress Black Friday Entrepreneur IT Technicians Business Management Hacks Holiday Geography Hard Disk Drive Emoji Saving Money Politics Infrastructure Antivirus Hacker Phishing Best Practice Migration Miscellaneous Employer-Employee Relationship Black Market Smart Tech IT Services Address Healthcare Test Tech Terms Sports Electronic Health Records Internet Exlporer Marketing Mobile Device Managment How To PowerPoint Meetings Windows 7 Regulations Unified Communications Theft Best Practices Help Desk Data Security Internet USB Firefox Mobile Data Instant Messaging Remote Worker Crowdsourcing Robot Backup and Disaster Recovery Upgrades Intranet Read Only Office Router Display Technology Tips Privacy Cables Webcam Innovation Email Virtual Assistant Productivity Efficiency Point of Sale Bookmarks Hackers Notifications Flexibility Spam Taxes Running Cable WannaCry Public Speaking Windows 10 Training Disaster Recovery Wireless Data Management Downtime Recycling High-Speed Internet Development Writing Authentication Unified Threat Management Money Botnet Applications Smartphone Tracking Google Drive The Internet of Things Fun Computer Hardware Company Culture Troubleshooting GPS Firewall Permission Knowledge Budget Server Management Vendor Management Heating/Cooling Recovery Scam Enterprise Resource Planning Computing Infrastructure Security Microsoft Office Motherboard Browser Undo End of Support Software Tech Support Redundancy Computers Employees Google Calendar 5G Cybersecurity Work/Life Balance VPN Analytics Avoiding Downtime Remote Monitoring and Management Domains Assessment Backup Business Technology Cleaning Remote Workers Save Time PDF Analyitcs SaaS Network Management Virtual Private Network Techology Relocation Encryption Server Settings Hard Drive Asset Tracking Chromebook Human Error Notes Files Alerts Apple MSP Data Recovery VoIP Cyberattacks Security Cameras Spyware Scary Stories Malware Blockchain Automobile Superfish Processors Alert Mobile Device Buisness Samsung IT Management Application Monitors Experience communications Patch Management Nanotechnology RMM Cache Managed Service Provider Backups IT Consulting Cooperation Outsourced IT Mobile Office Mobile Hard Drives Technology Wireless Technology IBM Big Data Connectivity Smartphones Safety Compliance IT Budget Screen Reader Google Docs Managed Services Provider Cybercrime Cryptocurrency Mobility Content Filtering Google Identities IT Consultant YouTube ROI Enterprise Content Management Personal Information Access Control Monitoring Refrigeration User Uninterrupted Power Supply Comparison Hiring/Firing iPhone Telephony Managed IT services Laptop Lenovo Authorization Specifications Identity Theft Websites Software as a Service Smart Technology Piracy Vulnerability Artificial Intelligence Administrator Voice over Internet Protocol SharePoint Lithium-ion Battery Cyber Monday Consultation Environment Virtual Reality BYOD Bandwidth Sync Wi-Fi Computer Repair Productivity Modem Break Fix Mobile Security Storage Communication App Multi-Factor Security Virtualization Private Cloud Windows 8 Current Events Unsupported Software Information Technology Deep Learning Mail Merge Co-managed IT Going Green Augmented Reality Workplace Tips Presentation HIPAA Machine Learning Data storage Wasting Time How To Identity Disaster CIO Administration Saving Time History Data loss

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...