Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Forget Sherlock Holmes, IBM’s Watson Can Solve the Mystery of Your Tax Refund

Forget Sherlock Holmes, IBM’s Watson Can Solve the Mystery of Your Tax Refund

In 2011, the world was introduced to IBM’s supercomputer Watson after it handily won the television quiz show Jeopardy!. Since then, Watson has been utilized in a variety of helpful ways, including customer service for Macy’s and Geico, as well as medical research. Today, Watson is being tapped by H&R Block to assist the public with an issue that affects every American, their taxes.

Continue reading

You Know Who’s Looking Forward to Tax Season? Identity Thieves

You Know Who’s Looking Forward to Tax Season? Identity Thieves

One of the most high-profile hacking attacks in the United States struck last year when the Internal Revenue Service (IRS) was breached. 464,000 Social Security numbers were swiped; enough to file 101,000 tax returns using false personal identification numbers. Every organization can learn how to better protect themselves during tax return season, especially since you have so much on the line every year.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

USB Modem Mobile Device Management Monitoring Avoiding Downtime Microsoft Excel G Suite Patch Management Enterprise Content Management Facebook Halloween Big Data User Tips Net Neutrality Wireless Technology Tip of the Week Trending E-Commerce Personal Information Hotspot Programming Proactive Tracking Regulations Recycling Network Security Relocation Unified Communications Remote Worker Microsoft Office Infrastructure The Internet of Things Staffing Screen Reader Test Twitter eWaste Wires Storage Help Desk IT Management Domains Servers Windows 10 Tech Term Downloads Password Tip of the week Lithium-ion Battery Development OneNote Address Printer Computing Infrastructure Time Management Management Permission Security Augmented Reality Legislation Employees Quick Tips Hiring/Firing Monitors Bitcoin Redundancy Google Drive Statistics Innovation Corporate Profile Software Browser Cost Management Automation Hard Drive Workplace Tips Technology Identity Theft ROI Politics Social Engineering Consulting Techology Star Wars IT Budget Remote Computing Web Server WiFi YouTube Risk Management Favorites Enterprise Resource Planning Document Management Gadget Cryptocurrency Business Intelligence Remote Monitoring and Management Efficiency Cyberattacks Bring Your Own Device Firewall Legal Disaster Recovery Taxes Mobile Meetings Disaster Data loss Administration Business Technology Proactive IT IT Consulting Data Breach Automobile Company Culture IT Services Shortcut Cloud Mobile Data Cameras Smart Technology Samsung Hacker Computers Touchscreen Windows Private Cloud Hosted Solution Outlook Blockchain Computer Repair Office 365 Network Virtualization Healthcare Telephone Systems Managed Services Provider Tech Support Productivity communications Technology Tips IoT Server IBM Search Save Time Alerts Passwords Antivirus Information History MSP Display Digital Signature Data Recovery Read Only Superfish Permissions Identities Project Management Business Machine Learning Public Cloud Social Networking Access Control Law Enforcement Tablet User Error Motion Sickness Office Electronic Health Records Humor Deep Learning Holiday Marketing Computer Care Smartphone Multi-Factor Security Distributed Denial of Service Managed Service Retail Entrepreneur Customer Relationship Management Managed IT Government Spyware Scam Gadgets Business Growth User Refrigeration Social Piracy Applications Instant Messaging Dark Web Internet of Things Smartphones Cabling Consumers Buisness Social Media Nanotechnology Compliance Backup and Disaster Recovery Hardware Data Backup Mobile Office Typing Connectivity Telephony PowerPoint Financial Lenovo Network Management 5G Phone System GPS Money Network Congestion Migration Information Technology HIPAA Competition Phishing Zero-Day Threat Comparison Motherboard Specifications Computer Hard Drives Files Android Authorization Current Events Smart Tech Virtual Private Network Black Market Mouse Environment Content Filtering Documents Knowledge RMM Hosted Solutions Mobile Device Managment Managed Service Provider Electronic Medical Records Travel Finance Productivity IT solutions Operating System How To Drones Vendor Management Tech Terms LiFi Unsupported Software Hard Disk Drive Mobility Saving Money Writing Processors Chrome IT Technicians Server Management Geography Google Maps Unified Threat Management Malware Best Practices Security Cameras Miscellaneous Google Docs Business Continuity Heating/Cooling Mobile Devices Websites BYOD Running Cable Apple Operations Bluetooth Hackers Alert Theft 3D Printing Point of Sale Vulnerabilities Flexibility Administrator Saving Time BDR Education VoIP Backups Co-managed IT Dark Data WannaCry Utility Computing Mail Merge Internet Exlporer Customer Service Application Managed IT Services Recovery Budget Sync Office Tips End of Support Black Friday Word Ransomware Outsourced IT Bookmarks Language Error Downtime Mobile Computing Microsoft Identity Software Tips How To Staff Assessment Asset Tracking Wi-Fi Alt Codes Google Calendar VPN Update Gmail Data Security Undo Windows 10 Safety Fleet Tracking Mobile Security Unified Threat Management Wearable Technology Upgrades Presentation Software as a Service IT Consultant Managing Stress Conferencing CCTV Cache Networking Cloud Computing Two-factor Authentication Solid State Drive Chatbots Features Intranet Data Warehousing Chromebook Botnet Remote Monitoring Save Money Internet Physical Security Break Fix WPA3 Paperless Office Router Fraud Employee-Employer Relationship Fun Vulnerability Google App Settings Business Owner IT Support Collaboration Encryption Business Management Virus Training Cookies Analyitcs Data Employer-Employee Relationship Cybersecurity Experience Troubleshooting SaaS Virtual Desktop Cortana Business Computing Bandwidth File Sharing Cleaning SharePoint Mobile Device Work/Life Balance Users Authentication High-Speed Internet Digital Best Practice Managed IT Service Website Digital Payment Backup Sports Cyber Monday IT service Windows 8 Hacking Hacks Apps Spam Wireless VoIP Artificial Intelligence Data storage CIO Licensing Analytics Going Green Computing Data Management Robot Cybercrime Maintenance iPhone Uninterrupted Power Supply Firefox Mirgation Public Speaking Supercomputer Disaster Resistance Emoji Technology Laws Scary Stories Virtual Reality Remote Workers Procurement IP Address Small Business Health Printing Cooperation PDF Laptop Human Error Managed IT services Communication Privacy Upgrade IT Support Email Webcam Consultation Cables Crowdsourcing Google Wallet Notifications

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...