Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Where the Internet Stands in 2018

Where the Internet Stands in 2018

People spend a lot of money on the Internet. From an individual standpoint, the amount the average person spends on Internet-based services is their largest expense outside of the money they spend on their residence, and perhaps their transportation costs. In order to understand the landscape of what is effectively a battle for Internet supremacy, you first have to take a look at the battlefield itself.

Continue reading
0 Comments

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

Continue reading
0 Comments

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

Continue reading
0 Comments

3 Ways the Future of the Internet of Things will Shape Up

b2ap3_thumbnail_future_of_internet_of_things_400.jpgThe Internet of Things is changing the face of web-connected devices as we know it. Some would argue that the world isn’t ready for the IoT, but it’s on its way nonetheless. But what really constitutes the Internet of Things? InfoWorld suggests that a lot of what the public sees as the Internet of Things shouldn’t be classified as IoT devices. Therefore, we need a more substantial definition for this revolutionary phenomenon.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Identity Theft Instant Messaging Trending Deep Learning Flexibility Virtual Desktop Business Migration MSP CIO Tracking Business Owner Running Cable LiFi BDR Tip of the week Healthcare Unified Threat Management Current Events Motion Sickness Spyware Network Digital Comparison Cables OneNote Government Point of Sale Workplace Tips Supercomputer Hacking Networking Gadget Cybercrime Enterprise Content Management Permissions Telephony Cryptocurrency Browser Apple Cloud Computing Blockchain Mobile Device Management Managed IT Services Budget Project Management Domains Best Practices Monitors Hard Drive Features Content Filtering Touchscreen Samsung Fraud Chrome Downtime IT service Holiday Database Black Market Intranet Geography Regulations Smartphones Hosted Solution Router History Two-factor Authentication Technology Tips Wireless USB IT Budget Mobile Taxes Google Wallet Managed IT Service Office Lenovo PDF Entrepreneur Computer Repair Documents Bandwidth Windows 7 Automation Mobile Security Telephone Systems Cabling App Server Recovery Tablet Collaboration Nanotechnology Knowledge YouTube Settings Spam Storage Test Network Security Programming Bitcoin Remote Computing Sync Malware Computing Infrastructure Security Cameras Writing Computers Undo Windows Infrastructure Mobility Managed IT services Security Machine Learning Gmail Mirgation Google Maps Consulting Google Data Security Processors Saving Money Drones ROI Avoiding Downtime Utility Computing Cyberattacks BYOD Private Cloud Phone System 3D Printing Wires 5G Politics Proactive IT E-Commerce Technology Efficiency Marketing Mobile Device Managment Printer Virus Office 365 Business Continuity PowerPoint Training Facebook Superfish VoIP Licensing Access Control Statistics Electronic Medical Records Analytics Humor Wireless Technology IT Consulting Analyitcs VoIP Display Managed Service Unified Communications Digital Payment The Internet of Things Typing Augmented Reality Wearable Technology Social Disaster Resistance Shortcut Update Passwords Maintenance Compliance VPN Administrator Connectivity Business Growth Notes Microsoft Excel Halloween Remote Monitoring and Management Wasting Time Servers Unsupported Software Tech Terms Network Congestion Recycling Patch Management End of Support Dark Data CCTV Smart Technology Cameras Screen Reader Hacker Alt Codes Vendor Management Windows 10 Productivity Piracy Email SaaS Technology Laws Cooperation Safety communications Identity Operations Hiring/Firing GPS Emoji Proactive Printing Phishing Mobile Devices Google Drive Scary Stories Management Tip of the Week Uninterrupted Power Supply RMM Relocation Notifications Applications Virtual Reality Retail SharePoint Privacy Outsourced IT Language Save Time Hosted Solutions IT Technicians Hackers Android Website Software as a Service Remote Workers Company Culture eWaste Social Networking Cyber Monday Meetings Websites IoT WiFi Chromebook Identities Users IBM Read Only Quick Tips Public Cloud Professional Services Business Computing High-Speed Internet Antivirus Data Backup Internet of Things Windows 8 Break Fix Search Specifications Artificial Intelligence Data Breach Customer Service Going Green Corporate Profile How To Best Practice Managing Stress Operating System Software Tips Star Wars WPA3 Dark Web Business Intelligence Electronic Health Records G Suite Managed IT Work/Life Balance Files File Sharing Multi-Factor Security Vulnerabilities Staffing Unified Threat Management Word Vulnerability Legislation Business Management Mobile Device Bring Your Own Device Outlook Heating/Cooling Permission Firefox Favorites Monitoring Techology Address Network Management Small Business Information Technology Backups Alert Fun Password Saving Time Firewall Employees Data Data storage Health Productivity Redundancy Money Disaster Recovery Employer-Employee Relationship Social Media Smartphone Internet Exlporer Consultation Development Upgrades Authorization Data loss How To Public Speaking User Error Webcam Zero-Day Threat Physical Security Assessment IT Support Sports Encryption Downloads Application Tech Term Chatbots Asset Tracking IT Services Mail Merge Upgrade Modem Crowdsourcing Financial Remote Worker HIPAA Net Neutrality Bookmarks Cloud WannaCry Social Engineering Mobile Data Mouse Mobile Office Google Docs Human Error Finance Big Data IT Management Miscellaneous Automobile Buisness Internet Microsoft Windows 10 Information Ransomware Tech Support Computer User Tips Law Enforcement Time Management Voice over Internet Protocol Web Server Procurement Risk Management Administration Cleaning iPhone Data Recovery Mobile Computing Innovation IT Support Refrigeration Hacks Twitter Education Virtual Assistant Disaster IT Consultant Google Calendar Co-managed IT Personal Information Digital Signature Hotspot Distributed Denial of Service Robot Smart Tech Customer Relationship Management Wi-Fi Save Money Communication Software Conferencing Computing Data Management IT solutions Laptop Presentation Cookies Backup and Disaster Recovery Office Tips Document Management Staff Virtual Private Network Hardware Managed Services Provider Environment Employee-Employer Relationship Remote Monitoring Alerts Computer Care Legal Data Warehousing Lithium-ion Battery Hard Disk Drive Enterprise Resource Planning IP Address Authentication Paperless Office Cybersecurity Hard Drives Error Bluetooth Travel Fleet Tracking Consumers Cortana Competition Gadgets Cost Management Scam Black Friday Apps Theft User Solid State Drive Cache Business Technology Virtualization Botnet Troubleshooting Backup Motherboard Managed Service Provider Help Desk Microsoft Office Server Management Experience

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code