Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Aren’t Users Buying More Tablets?

Why Aren’t Users Buying More Tablets?

When tablets first hit the market, the general prediction was that they would eventually replace PCs as the de facto device for computing, However, based on their steadily declining sales, this prediction seems to be a little off base--but, why? A closer examination provides some insight into why tablet sales have dipped.

Continue reading
0 Comments

Apple vs Samsung: Who Makes Better Tablets?

Apple vs Samsung: Who Makes Better Tablets?

In today’s mobile-centric world, portability is becoming more and more crucial to success in business affairs. This phenomenon can easily explain why tablets are commonplace in boardrooms and briefcases. With Apple and Samsung offering two heavy-hitting tablets (the Galaxy Tab S3 and the iPad Pro), we’ve decided to analyze their features head-to-head to find out which is the supreme option for your business needs.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Virtual Desktop Office 365 Legislation How To RMM Server Management Gadgets Quick Tips Save Time MSP Google Wallet Enterprise Content Management Social Engineering Help Desk Employer-Employee Relationship G Suite Chromebook Apps Monitors App Notifications Server Smartphones Legal Hacking Office Tips Knowledge IT solutions Application Virtualization Virtual Private Network Virtual Reality Marketing Ransomware Network Security Identity Cookies Social Administrator communications User Tips Cybercrime Geography Saving Money Remote Computing Chrome Bitcoin Lenovo Scary Stories Backup and Disaster Recovery Innovation Disaster Resistance Typing Environment Halloween Best Practice Computing Redundancy Presentation Data Recovery Staffing Website Managed IT Digital Signature Private Cloud Hacks Comparison Wi-Fi HIPAA Solid State Drive Supercomputer Chatbots USB Co-managed IT File Sharing Gadget Statistics SaaS Vulnerability Hard Disk Drive Fleet Tracking Digital Managed IT services CCTV Technology Training Mobile Device Managment Infrastructure OneNote Law Enforcement Proactive Business Owner Read Only Tech Support Business Computing Unified Threat Management Antivirus Fraud Word PDF Hacker Virus Holiday Mobile Device Management Work/Life Balance Cooperation Electronic Medical Records WannaCry Management End of Support Hotspot Workplace Tips Project Management Internet Exlporer BYOD Save Money Information Users Firewall Recovery Education Mail Merge Software Tips Hardware Patch Management Wireless Access Control Spam Conferencing Vulnerabilities Backups Remote Workers Zero-Day Threat Software Botnet Going Green Hiring/Firing Network Management WPA3 Operations Crowdsourcing Utility Computing Search Business Technology VoIP Mobile Computing Finance Computer Repair Refrigeration Gmail Black Friday Productivity CIO Net Neutrality IoT Password Relocation Outsourced IT Cache Technology Laws Firefox SharePoint Cortana Safety Consultation Security Cameras Government Security Business Management Disaster Tip of the week Best Practices Printer Electronic Health Records Data loss Troubleshooting Black Market Small Business Apple Network Congestion Scam Sync Windows Cyber Monday Bookmarks Cryptocurrency Display Modem Staff Twitter Information Technology Permissions Automation Sports Storage Time Management Windows 10 Money User Language Point of Sale History Privacy Managed Service Provider Social Media Wearable Technology Meetings Browser Mirgation Customer Service Superfish Motion Sickness Bandwidth Avoiding Downtime Nanotechnology Consumers Networking Entrepreneur Managed Service Drones Downtime Bluetooth Managed IT Services Wires Connectivity Windows 10 Risk Management Techology Assessment Phishing Documents Motherboard Compliance Paperless Office Tablet Google Drive Mobility Politics Digital Payment IT Consulting Travel Running Cable Software as a Service Employee-Employer Relationship Corporate Profile Mobile Document Management IT Services Smartphone Cleaning Competition Screen Reader Authorization Google VPN Distributed Denial of Service Encryption Mobile Devices Unsupported Software Efficiency Taxes Migration Computer Care Address Internet Upgrade Backup Saving Time Employees Network Piracy Alt Codes Tracking Two-factor Authentication LiFi Bring Your Own Device Upgrades Downloads Touchscreen Financial Healthcare Heating/Cooling Monitoring Hosted Solution Cost Management Retail Managed IT Service Multi-Factor Security Cybersecurity Automobile Hard Drive Disaster Recovery Break Fix Mouse Settings Cabling Telephone Systems Undo Smart Technology Tech Term eWaste Hackers Proactive IT Email Computers Writing Data Management Outlook Alert Robot IT Management Malware Mobile Office Health Lithium-ion Battery Laptop Deep Learning Microsoft Business Intelligence IT Support Development Remote Monitoring and Management Recycling Remote Worker Facebook Public Cloud Human Error Asset Tracking Remote Monitoring Trending Artificial Intelligence Augmented Reality Spyware Processors Experience Business Servers Websites Hosted Solutions The Internet of Things Telephony Theft Data Security Communication IP Address Machine Learning Microsoft Excel Technology Tips Internet of Things WiFi Specifications Identity Theft Budget Features Big Data Current Events High-Speed Internet Cloud Computing Identities IT Consultant Content Filtering Mobile Device Instant Messaging PowerPoint How To Data Backup Google Docs Operating System Customer Relationship Management Office Data Warehousing Blockchain ROI Data Permission IT Technicians Analytics Samsung BDR Maintenance E-Commerce Computing Infrastructure Company Culture Hard Drives Licensing Computer Public Speaking IT Support Fun Buisness Phone System Mobile Data 5G Windows 8 Humor Microsoft Office Procurement iPhone Printing Test Alerts IT Budget Applications Tip of the Week Managing Stress User Error Miscellaneous Emoji Google Maps IBM Smart Tech Unified Communications IT service Files YouTube Regulations Collaboration Android 3D Printing Passwords Webcam Intranet Unified Threat Management Star Wars Cables Managed Services Provider Data Breach Dark Data Business Continuity Dark Web Mobile Security Social Networking Cloud Domains Shortcut GPS Tech Terms Administration VoIP Analyitcs Data storage Physical Security Cyberattacks Personal Information Business Growth Flexibility Favorites Enterprise Resource Planning Vendor Management Update Web Server Wireless Technology Error Programming Cameras Google Calendar Consulting Productivity Uninterrupted Power Supply Router Authentication

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code