Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Short History of Data Backup and Storage

A Short History of Data Backup and Storage

Data backup has become an essential piece of the modern business’ computing infrastructure but the act of protecting data from being lost is centuries old. Before there was recorded civilization, there were humans writing on the cave walls and carving notches into bone to aid counting and other primitive mathematics. Today, we take a look at the history of backing up data, and how it has brought us to where we are now.

Continue reading
0 Comments

Tech Term: Exploring Network Attached Storage

Tech Term: Exploring Network Attached Storage

IT is filled with jargon and terms that are likely to bamboozle someone without hands-on experience with the solutions that power a business. One such term is network attached storage, or its shorthand, NAS. Today, we’ll examine this tech term to learn more about it, and what influence - if any - it should have on your business.

Continue reading
0 Comments

Dark Data Continues to Be a Problem for Businesses

b2ap3_thumbnail_dark_data_waste_400.jpgYour business requires specific data to keep operations moving on a daily basis. However, for all of the data that you use, there’s information that you have stored away that never sees the light of day. This “dark data,” could be putting your business at risk, especially if auditing your current data storage usage isn’t a top priority. If you don’t keep track of your dark data, you could be facing much larger problems than unnecessary storage costs.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Consulting Saving Time Programming Networking Managed IT Facebook Google Drive Legislation Software as a Service Alt Codes Government RMM Cyberattacks Application Procurement End of Support Cooperation Information Technology Productivity Maintenance Automobile WannaCry Chrome Administration IT Services Websites Technology Tips IP Address Co-managed IT Disaster Recovery Windows Servers Employer-Employee Relationship Meetings Knowledge Alert Malware Wi-Fi Save Money Management Hacks Passwords Data loss Browser Network Congestion Refrigeration Time Management Bandwidth IoT Computer Care Vulnerabilities Migration Electronic Health Records Electronic Medical Records Disaster Resistance Internet Emoji Cybercrime Collaboration Crowdsourcing Point of Sale Apple Wireless Google Deep Learning Writing Hosted Solution Business Finance Applications Content Filtering Techology Proactive IT Digital Experience Smartphones Hosted Solutions Virus Budget Alerts Chatbots Firefox Physical Security Identity Theft Company Culture Unified Communications Current Events Cloud Computing Authentication Technology Laws Customer Service Politics Data Backup Documents Hard Drives Taxes Telephone Systems Gadget Buisness Supercomputer Microsoft Blockchain Managed IT Service Security Productivity SaaS Avoiding Downtime Retail Automation Business Owner Sports Machine Learning Uninterrupted Power Supply Multi-Factor Security Spyware Business Growth IT Consulting Consumers Shortcut Mobile Computing Miscellaneous Dark Data Phishing Sync How To Firewall Conferencing Data Management Intranet Access Control Technology Computing Infrastructure Operating System Windows 8 Security Cameras Computers Storage Bring Your Own Device communications IBM Domains Infrastructure Language Quick Tips Statistics Network Security Computing Net Neutrality Cost Management Printing Humor Password Data Recovery Tip of the week VoIP Website Asset Tracking Data storage Public Speaking Hotspot Email Windows 10 Tablet Cyber Monday Virtual Private Network eWaste Project Management Server Robot File Sharing Entrepreneur IT Budget BDR Microsoft Office Bookmarks Cybersecurity Legal Settings Office Tips Customer Relationship Management Social Networking Monitors Holiday Features Tech Support Marketing Mobile Device Managment Social Media Hacker Disaster How To Dark Web Business Management Administrator Printer Enterprise Content Management SharePoint Processors Software Two-factor Authentication Mobile Devices Backup and Disaster Recovery Android Enterprise Resource Planning Managed IT Services Business Computing PDF Risk Management Fleet Tracking Unified Threat Management Office Digital Signature Social Router User Tips Gmail Managed Service Computer Monitoring Read Only Twitter High-Speed Internet Update Troubleshooting Competition Nanotechnology Instant Messaging Analyitcs Black Friday Laptop Encryption History Flexibility Favorites Paperless Office Drones Cryptocurrency Mobile Device Error Mobile Hard Disk Drive 3D Printing Workplace Tips Internet of Things Bluetooth Data Halloween Efficiency Mobile Device Management Communication Help Desk Tech Term GPS CIO Corporate Profile WPA3 Managed Service Provider Remote Worker Work/Life Balance Assessment Regulations Managed IT services Phone System Zero-Day Threat Connectivity Cortana Solid State Drive Development Mobile Office Education Backups Google Maps Test Hard Drive Fraud Upgrades Social Engineering CCTV Cabling Display Virtual Reality Gadgets Tech Terms Best Practice Telephony Cache App Wires Patch Management Data Security Spam Permissions Screen Reader Server Management Public Cloud Comparison Apps Saving Money Users Cables Microsoft Excel Licensing Remote Computing LiFi Network Smart Tech Document Management VoIP Ransomware Remote Workers Business Continuity ROI Geography Tip of the Week Training Typing Virtualization Internet Exlporer Remote Monitoring and Management Mobility Mobile Security Word Law Enforcement Software Tips Bitcoin Specifications Windows 10 Antivirus Scam Unsupported Software Running Cable Hackers Private Cloud Google Calendar Presentation Identity Undo Relocation Digital Payment Distributed Denial of Service Star Wars Innovation PowerPoint Small Business 5G Employees Mirgation Lithium-ion Battery Black Market Going Green Cleaning Mobile Data E-Commerce Mail Merge Safety Outsourced IT Vendor Management WiFi Utility Computing IT solutions Staff Scary Stories Travel Authorization Artificial Intelligence Cookies VPN Lenovo Cameras iPhone Network Management Redundancy IT service Google Docs Upgrade The Internet of Things Consultation USB Piracy Analytics Health Managed Services Provider Notifications Webcam Wireless Technology IT Consultant BYOD Data Breach Virtual Desktop Financial Proactive Money G Suite Business Technology Motion Sickness Permission Address Recycling Identities Big Data Outlook Personal Information Augmented Reality Privacy Best Practices Hiring/Firing Downtime HIPAA IT Support Wearable Technology Compliance Mouse Touchscreen User Superfish YouTube Tracking Remote Monitoring Theft IT Management Information Recovery Unified Threat Management Fun Modem Business Intelligence Backup Motherboard Chromebook IT Support OneNote Hacking IT Technicians Managing Stress User Error Trending Healthcare Environment Office 365 Heating/Cooling Break Fix Google Wallet MSP Files Computer Repair Botnet Smart Technology Save Time Employee-Employer Relationship Web Server Staffing Operations Samsung Human Error Downloads Data Warehousing Search Cloud Hardware Smartphone Vulnerability

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code