Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An Astounding 50% of IT Projects End in Failure

An Astounding 50% of IT Projects End in Failure

How did your last major IT initiative turn out? Were you able to get what you wanted implemented in an orderly fashion, or did it fail to provide a return on investment? You might be surprised to hear that half of the IT projects implemented by businesses ultimately wind up as a failure, and these numbers have been increasing over the past several years.

Continue reading

Pass the Barbeque Sauce: When Upgrading Goes Too Far

Pass the Barbeque Sauce: When Upgrading Goes Too Far

Upgrading technology is a sure way to improve the efficiency, security, and productivity of your company’s operations, but is there a point when upgrading one’s tech can go too far? As much as you hear us sing the praises of upgrading, we have to admit that there’s a point when you can have too much of a good thing.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

RMM Mobile Office Big Data Mobile Security Business Computing Network Security Internet Exlporer Authentication Government Productivity Entrepreneur Search Backup Dark Data Mobile Device Managment Files Smart Tech How To Human Error Wi-Fi CIO Vulnerability Management Virtual Desktop Privacy Enterprise Resource Planning Office 365 Bitcoin Disaster Resistance Healthcare Cooperation Recycling Hard Drive Internet of Things Patch Management Microsoft Office Tip of the week Remote Monitoring Heating/Cooling Disaster Recovery ROI BDR Two-factor Authentication Automation Data Backup E-Commerce IP Address Chatbots Settings Environment Error Current Events Wireless Windows 10 Black Market Maintenance Smartphone Lenovo Antivirus Employee-Employer Relationship Retail Relocation Taxes Bring Your Own Device Legislation IT Consultant USB Going Green Social Technology Laws Theft Printer Virus Outsourced IT Emoji Communication Operating System Connectivity Net Neutrality Google Docs Instant Messaging End of Support Piracy HIPAA Redundancy Internet CCTV Windows Mail Merge Health Telephony Apps Distributed Denial of Service Electronic Health Records Network Congestion Firefox Disaster Geography IT Budget Mobility Analytics Superfish Data Breach Save Money Backups PDF Spam Remote Computing Budget IT Support User Consumers Cloud Shortcut Websites Staffing Physical Security Consulting Hacker Best Practices Web Server Crowdsourcing Machine Learning Website Google Drive Digital Public Cloud Cleaning Hosted Solution SharePoint Motherboard Data Recovery IT service Saving Money Migration Computer Care Holiday eWaste Saving Time Managed IT Service Gadget Unified Threat Management Multi-Factor Security Assessment Gadgets Tech Term Business Technology Cortana 5G Mobile Device Management Virtualization Business Continuity Google Maps Company Culture Finance Business Intelligence High-Speed Internet Solid State Drive Mouse Vendor Management Customer Service Managed IT Services WPA3 Private Cloud Mobile Remote Monitoring and Management Training Typing Risk Management Presentation Supercomputer MSP Conferencing Read Only Backup and Disaster Recovery Scary Stories Firewall Robot Chrome Office Tips Meetings Technology Tips Remote Worker Smartphones Vulnerabilities User Tips Fun Recovery Alt Codes Managing Stress YouTube Intranet Hardware Smart Technology Applications Fraud Cryptocurrency Uninterrupted Power Supply Innovation SaaS Downloads G Suite Proactive Procurement Sync Technology Infrastructure Computing Infrastructure Mobile Device Deep Learning Tech Terms Safety Access Control Screen Reader Lithium-ion Battery Word Computers Public Speaking Networking Corporate Profile Cabling Trending Operations Data Management Travel Hacking Downtime Black Friday Server Windows 10 Sports Competition Data Security Upgrade Consultation Twitter Star Wars Best Practice Spyware Money Document Management Android Drones Programming Zero-Day Threat Tracking IBM Gmail Virtual Private Network Update Printing Processors Cookies Data Alerts Unified Communications Notifications Passwords Tip of the Week Cloud Computing Information Wearable Technology Troubleshooting Permission Identity Password Security Managed Service Provider Small Business Hotspot Content Filtering Education Facebook Mobile Devices Business Help Desk Webcam Browser iPhone VPN Upgrades Politics Identity Theft Software as a Service Favorites Artificial Intelligence VoIP Social Media Licensing Electronic Medical Records IT Consulting Bluetooth Business Growth Hard Drives Display Storage Collaboration Microsoft Excel Cache Halloween IoT Phishing Outlook Tablet Malware Cost Management Enterprise Content Management WannaCry WiFi Computer User Error Windows 8 Hacks Botnet How To Running Cable Server Management Save Time Documents Flexibility Avoiding Downtime Chromebook Software Tips Test Unified Threat Management Marketing Knowledge Computer Repair Scam Virtual Reality BYOD Financial Managed IT Cables Undo Computing PowerPoint Google Calendar Unsupported Software Business Owner Miscellaneous Staff Ransomware Mirgation Hackers Hard Disk Drive Identities Law Enforcement Domains App Alert Servers Wireless Technology Refrigeration Development Nanotechnology Business Management File Sharing Telephone Systems Data loss Mobile Computing Statistics Efficiency Point of Sale Motion Sickness Productivity Augmented Reality Monitoring Modem Cyber Monday Quick Tips Utility Computing Comparison 3D Printing LiFi Hosted Solutions Phone System Monitors Automobile Break Fix OneNote History Remote Workers Managed Service Digital Payment Hiring/Firing Employees Administration Paperless Office Fleet Tracking Work/Life Balance Google Wallet Co-managed IT Workplace Tips Software GPS Cybercrime Asset Tracking Users Features Bookmarks Tech Support IT Management Wires Network Management Email Language Social Engineering Cameras Managed IT services VoIP Application Microsoft IT Support Time Management Permissions Blockchain Security Cameras Bandwidth Authorization Customer Relationship Management Compliance Legal Specifications Address Managed Services Provider Regulations Dark Web Personal Information Data storage Techology IT Technicians Digital Signature Information Technology Laptop Social Networking Router Project Management Cyberattacks Cybersecurity IT Services Network Humor Employer-Employee Relationship Proactive IT communications Samsung Writing Analyitcs Touchscreen Office Mobile Data Experience The Internet of Things Encryption Administrator Apple Google IT solutions Buisness Data Warehousing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...