Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Where the Internet Stands in 2018

Where the Internet Stands in 2018

People spend a lot of money on the Internet. From an individual standpoint, the amount the average person spends on Internet-based services is their largest expense outside of the money they spend on their residence, and perhaps their transportation costs. In order to understand the landscape of what is effectively a battle for Internet supremacy, you first have to take a look at the battlefield itself.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

3 Ways the Future of the Internet of Things will Shape Up

b2ap3_thumbnail_future_of_internet_of_things_400.jpgThe Internet of Things is changing the face of web-connected devices as we know it. Some would argue that the world isn’t ready for the IoT, but it’s on its way nonetheless. But what really constitutes the Internet of Things? InfoWorld suggests that a lot of what the public sees as the Internet of Things shouldn’t be classified as IoT devices. Therefore, we need a more substantial definition for this revolutionary phenomenon.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Staffing Legislation IoT Hacker Gadget How To Authorization Telephony Politics Read Only Digital Signature Tip of the week Superfish Taxes Software as a Service Managed Service Provider Hardware Patch Management USB Co-managed IT Automobile Migration Managed IT Services Trending Physical Security IT Consulting Lithium-ion Battery Encryption PowerPoint Buisness IT Support Business Management Twitter Update Mobile Shortcut Data Backup Processors communications How To WannaCry Current Events Instant Messaging Networking Risk Management Webcam Modem Money Drones Permission Cybersecurity Printer Operations WiFi Going Green IT Consultant Storage Upgrade Deep Learning Windows 8 Microsoft Office Apple Education Mobile Devices Email Social Environment Net Neutrality Error Applications Relocation Geography Computer Care Mobile Device Managment Customer Service Tablet Electronic Health Records Information User Tips Work/Life Balance Data Recovery Cookies Antivirus Alert Vulnerabilities Staff User Travel Spyware Identities Facebook Hard Disk Drive Smart Tech Dark Web Bluetooth Procurement Computing Social Engineering Search Tip of the Week Touchscreen Wires Help Desk Private Cloud WPA3 Google Wallet Web Server Hackers CCTV Cables File Sharing Google Calendar Assessment Business Continuity Permissions Unified Communications RMM IT service Firewall Alerts Hard Drives Proactive IT Google Docs Artificial Intelligence Security Features Management Managing Stress Network Entrepreneur Efficiency Budget Health Servers Managed IT services Saving Time Fleet Tracking Business Intelligence Piracy E-Commerce Websites Motherboard Law Enforcement Company Culture Remote Monitoring Test Personal Information Competition Microsoft Excel Halloween Experience Tech Support VPN Apps Techology Android Screen Reader Office Time Management Typing Regulations eWaste Virus Hotspot VoIP Remote Worker Digital Payment Tech Term CIO Analytics YouTube Conferencing Wearable Technology Hosted Solutions IT solutions Alt Codes Documents Meetings Data Security Server Management Writing Wi-Fi Mobility Cost Management Printing Marketing Virtual Private Network Managed IT Service Crowdsourcing Social Media Domains Consulting Hacks Virtual Reality Google Legal IT Management Display Information Technology BYOD Hard Drive Tech Terms Software Cameras Saving Money Employee-Employer Relationship Cortana Business Growth Government Passwords Workplace Tips Security Cameras Business Owner Collaboration Malware Mobile Computing Network Security Compliance Social Networking Recovery Nanotechnology Cyber Monday Programming Blockchain Productivity User Error Sports Unsupported Software Small Business VoIP Save Time Google Drive Public Cloud Unified Threat Management Cooperation Sync Monitoring Cloud Consumers Identity Theft OneNote Fraud Application Spam Holiday Theft Office Tips Router Specifications Cloud Computing Website Mobile Office Comparison Network Congestion Safety Public Speaking Redundancy Managed Service Enterprise Resource Planning SharePoint Language Samsung Robot Customer Relationship Management Office 365 Google Maps Windows 10 Tracking Mobile Device Laptop Motion Sickness PDF Machine Learning Mobile Device Management Monitors Data storage Data Breach Employer-Employee Relationship IT Support Development Users Access Control Computer Repair Remote Monitoring and Management Business Technology Star Wars Avoiding Downtime Internet of Things Word Content Filtering Password Flexibility Healthcare Knowledge Managed IT Ransomware Unified Threat Management Bandwidth Gadgets Internet 5G Backup Infrastructure App Financial Dark Data Smartphones Best Practices Maintenance Downtime IBM Troubleshooting MSP Black Friday Two-factor Authentication End of Support LiFi Corporate Profile Cache Remote Workers Cyberattacks Administrator Disaster Scam Uninterrupted Power Supply GPS Smartphone Multi-Factor Security Gmail Refrigeration Internet Exlporer IT Technicians Zero-Day Threat Break Fix Technology Undo Productivity Electronic Medical Records Retail Asset Tracking Phone System Employees Presentation Communication 3D Printing Windows Human Error Server Wireless Distributed Denial of Service iPhone Proactive Chatbots Humor Remote Computing Data Mouse Phishing IT Services Automation Wireless Technology High-Speed Internet Cabling Authentication Recycling Project Management Privacy Windows 10 Fun Statistics Hosted Solution Virtual Desktop Analyitcs Outlook Operating System Notifications Bookmarks Disaster Resistance Outsourced IT Favorites Technology Tips Managed Services Provider Bring Your Own Device Technology Laws Computer Microsoft Business BDR IP Address The Internet of Things Files Browser Identity Smart Technology Paperless Office Administration Upgrades SaaS Finance Virtualization Firefox Bitcoin Licensing Software Tips Point of Sale Computers Connectivity Mobile Data Chrome Scary Stories Chromebook Augmented Reality Vulnerability Vendor Management Enterprise Content Management Black Market Miscellaneous Mirgation Cryptocurrency Downloads Training Supercomputer IT Budget Best Practice Utility Computing Intranet Heating/Cooling Quick Tips Data loss Cleaning Digital Document Management HIPAA Innovation Emoji Botnet Disaster Recovery Big Data Hacking Mail Merge Running Cable Network Management Telephone Systems G Suite Business Computing Cybercrime Backups Settings Mobile Security Lenovo Address Data Warehousing Consultation Save Money Computing Infrastructure ROI Solid State Drive Backup and Disaster Recovery History Data Management Hiring/Firing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code