Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Forget Sherlock Holmes, IBM’s Watson Can Solve the Mystery of Your Tax Refund

Forget Sherlock Holmes, IBM’s Watson Can Solve the Mystery of Your Tax Refund

In 2011, the world was introduced to IBM’s supercomputer Watson after it handily won the television quiz show Jeopardy!. Since then, Watson has been utilized in a variety of helpful ways, including customer service for Macy’s and Geico, as well as medical research. Today, Watson is being tapped by H&R Block to assist the public with an issue that affects every American, their taxes.

Continue reading

You Know Who’s Looking Forward to Tax Season? Identity Thieves

You Know Who’s Looking Forward to Tax Season? Identity Thieves

One of the most high-profile hacking attacks in the United States struck last year when the Internal Revenue Service (IRS) was breached. 464,000 Social Security numbers were swiped; enough to file 101,000 tax returns using false personal identification numbers. Every organization can learn how to better protect themselves during tax return season, especially since you have so much on the line every year.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Outlook Productivity Money CCTV Social Networking Cortana Specifications Remote Monitoring and Management Theft Social Engineering User Error Saving Time Mobility Business Computing Application Files Remote Monitoring Geography Router Hiring/Firing Disaster Recovery Co-managed IT Work/Life Balance Network Management Connectivity Search Artificial Intelligence Competition Development Website Browser Unified Communications Touchscreen Chrome Time Management Modem Features USB Technology Tips Hotspot Analyitcs End of Support Employees Bandwidth communications Small Business Apps File Sharing Comparison Point of Sale How To E-Commerce Wasting Time Hacker Fun Typing Wi-Fi Remote Computing Current Events Facebook Managed IT Proactive IT Troubleshooting WiFi Hosted Solution Cyber Monday Assessment Mobile Office Business Technology Email Humor Corporate Profile Web Server Multi-Factor Security Intranet Holiday Maintenance Data Management Hacking Test Remote Workers Mobile Data Break Fix Identity Theft Innovation Data Bluetooth Upgrades Computing Infrastructure Cloud Budget Trending Update Phone System Best Practices Wireless Technology Paperless Office Automation WannaCry Customer Service Cleaning Enterprise Content Management Unified Threat Management Antivirus Processors Help Desk Data Recovery IT Budget Remote Worker Health Cost Management Downloads Company Culture Managed Service Fleet Tracking Compliance WPA3 Tech Terms Black Friday Virtual Desktop 3D Printing Windows 7 Miscellaneous Google Drive Personal Information Bookmarks Human Error Save Time Redundancy Network Congestion Cybersecurity Cookies Virtual Assistant Software Tips Display Two-factor Authentication Infrastructure 5G Licensing Flexibility Security Cameras Identity Star Wars Notifications Tip of the week Disaster Resistance Data Warehousing Chromebook Programming Data Security Business Continuity Applications IT service Mouse Electronic Health Records Storage Hackers Social Media Business Management Domains Marketing Data Backup VoIP Telephony Smartphones Spyware Servers Halloween History Server CIO Cables Internet Exlporer Hard Disk Drive Laptop IT Management BYOD IP Address Supercomputer Mobile Computing Access Control Heating/Cooling Data loss IoT Mobile Device Management Motherboard Read Only Monitoring Scary Stories Outsourced IT Software Security Private Cloud Passwords Network Security Chatbots Tip of the Week OneNote Windows Tracking Efficiency Cyberattacks Gadgets Internet of Things Cloud Computing Managing Stress Professional Services Zero-Day Threat Password Privacy Quick Tips Identities Apple Firewall Travel Information IT Consulting Hard Drives How To Nanotechnology Backup and Disaster Recovery Business Growth Asset Tracking IT Services Voice over Internet Protocol Superfish Wireless Computers Managed Service Provider Unsupported Software Botnet Meetings Alert Language Vendor Management Saving Money Encryption Samsung Bitcoin Permissions The Internet of Things Alerts Best Practice Gadget Healthcare Technology Laws IBM Communication Word Virus Printer Office Save Money Database SaaS Safety Automobile HIPAA Cybercrime Lenovo Hardware Hosted Solutions Retail Ransomware Telephone Systems Firefox Undo Address Project Management Emoji Alt Codes VPN Virtual Reality Managed IT services Proactive Consulting Entrepreneur Windows 10 Document Management Managed IT Services Financial Managed IT Service Electronic Medical Records Office Tips PDF PowerPoint Hacks Downtime Data Breach Tablet Sports Dark Web Documents Collaboration Tech Term Consultation YouTube eWaste Bring Your Own Device Error Social Information Technology Printing Phishing Instant Messaging Uninterrupted Power Supply Mobile Devices Wearable Technology Vulnerability Lithium-ion Battery Blockchain Office 365 Administration Computer Wires Politics Virtual Private Network IT Consultant Cooperation Users Mobile Device Managment Scam Google Maps High-Speed Internet Robot Recovery MSP Notes Government Statistics BDR Administrator Avoiding Downtime ROI Network Virtualization Analytics User Law Enforcement Spam Staffing Computing iPhone Microsoft Office Windows 10 Management Augmented Reality Knowledge Training Refrigeration Conferencing SharePoint Android Twitter Digital Going Green Mail Merge Machine Learning Solid State Drive Managed Services Provider IT solutions Settings Cache Gmail Business Owner Server Management Smart Tech Internet Computer Care IT Technicians Risk Management Mobile Security Employer-Employee Relationship Operating System Websites Mobile Device Education Business Technology User Tips Data storage Net Neutrality Motion Sickness Digital Payment Smart Technology Fraud VoIP Crowdsourcing IT Support Backup Cabling Migration Mobile Taxes Networking Software as a Service Business Intelligence App Digital Signature Google Calendar Writing Vulnerabilities Workplace Tips Shortcut Backups Screen Reader Content Filtering Customer Relationship Management G Suite Patch Management Regulations Employee-Employer Relationship Permission Legislation Staff Favorites Experience Procurement Recycling IT Support Smartphone Tech Support Hard Drive Running Cable Unified Threat Management Upgrade Environment Utility Computing Legal Consumers Distributed Denial of Service Computer Repair Microsoft Relocation GPS Dark Data Authorization Google Wallet Cameras Windows 8 RMM Drones Authentication Deep Learning Operations Techology Sync Piracy Microsoft Excel Buisness Big Data Webcam Disaster Black Market Public Cloud Productivity Physical Security Mirgation Enterprise Resource Planning Public Speaking Cryptocurrency LiFi Google Docs Presentation Monitors Malware Finance Google

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...