Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Reexamining Meltdown and Spectre

Reexamining Meltdown and Spectre

It’s been about a year and a half since the Meltdown and Spectre exploits became publicly known. While patches and updates were administered to reduce their threat, they continue to linger on in a less serious capacity. Of course, this doesn’t mean that the threat has entirely been neutered--you still want to know what these threats do and whether or not you’re safe from them.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Email User Deep Learning Politics Telephony Alt Codes Disaster Windows 8 Fraud Heating/Cooling Dark Data Network Congestion Malware Troubleshooting VPN Environment Save Time Managed IT Two-factor Authentication Computing Infrastructure SaaS Refrigeration Statistics Domains Cryptocurrency Laptop High-Speed Internet Electronic Medical Records Hacks Mobile Security Google Chatbots Cooperation communications Mobile Device Managment E-Commerce Healthcare Efficiency Artificial Intelligence How To Files Cleaning Law Enforcement Operations Relocation File Sharing Outsourced IT Sync Chrome Personal Information Google Wallet Notifications History Lenovo Trending Mobile Devices WannaCry Nanotechnology Management Word Net Neutrality Buisness Vulnerabilities Electronic Health Records Supercomputer Uninterrupted Power Supply Virtualization IT Budget Emoji Samsung Staffing Bitcoin Assessment Scary Stories Wearable Technology Halloween Remote Monitoring and Management Printer Budget Cabling Robot Cybercrime Humor Virus Regulations Time Management Google Calendar Touchscreen Botnet Superfish Procurement Disaster Recovery Flexibility Storage Monitoring Encryption Business Management Hacking Test Fleet Tracking Spam Enterprise Resource Planning Travel Private Cloud Saving Time Router Going Green Productivity Mobility Wireless Webcam Tracking Wireless Technology Theft Features CIO Conferencing Computer Corporate Profile Document Management Backup Managed Services Provider Computer Repair Favorites Automation User Tips Business Intelligence Public Speaking Migration Consulting Health Sports VoIP Apps Backups Hard Drive Address Websites Business Growth Customer Relationship Management Permissions Data Backup Quick Tips Tip of the Week Retail Multi-Factor Security Techology Remote Computing Chromebook Workplace Tips Cyber Monday Ransomware Shortcut Alerts Help Desk IT Support Managed Service Provider End of Support Facebook Network Management Mail Merge Data Cloud Settings Bandwidth Data storage Twitter Office Save Money Crowdsourcing Managed Service Hard Disk Drive Meetings SharePoint The Internet of Things Technology Upgrades Social Media Google Maps ROI Servers Knowledge Security Cameras Gadgets Hosted Solution Tablet Business Computing Server Consumers Finance IoT Star Wars Distributed Denial of Service Smartphone eWaste Internet of Things Wi-Fi Tech Term Money Proactive IT Financial BYOD IT service Tech Support Hacker Smart Technology Mirgation Computing Privacy 5G Alert Language Server Management Instant Messaging Cookies Vendor Management Entrepreneur Technology Tips Content Filtering Operating System Business Technology Gadget Patch Management Connectivity Data Warehousing Best Practice MSP Miscellaneous IT Support Read Only Training IT solutions Project Management Permission Managed IT Services USB Employer-Employee Relationship Presentation Cortana WPA3 Cost Management Information Technology Paperless Office Microsoft Office LiFi Unified Communications IT Technicians Licensing Managing Stress Cyberattacks Dark Web Lithium-ion Battery Access Control Network Information IT Management CCTV Staff IT Consultant Avoiding Downtime Phone System Typing Gmail Wires Virtual Private Network Authorization Display Hackers Specifications Co-managed IT Comparison Screen Reader Search Infrastructure IT Consulting Unsupported Software Mouse Mobile Mobile Data Collaboration Microsoft Excel Digital Signature PDF Black Market Office Tips Downtime Solid State Drive Passwords Applications Public Cloud Windows Social Engineering Tip of the week Remote Workers Cameras Redundancy Point of Sale Virtual Desktop Unified Threat Management Disaster Resistance Company Culture Blockchain Intranet Networking Employees Browser How To Users Experience Zero-Day Threat Big Data 3D Printing Enterprise Content Management Modem Virtual Reality Upgrade Undo Telephone Systems Spyware Black Friday Legal Scam Authentication Employee-Employer Relationship Security Proactive Technology Laws Business Owner RMM Maintenance Computer Care Software Development Unified Threat Management Backup and Disaster Recovery Cache GPS iPhone Bookmarks Physical Security Small Business Current Events Business Administration Customer Service Innovation Business Continuity User Error Automobile Identity Theft HIPAA Smartphones Computers Running Cable Consultation Risk Management Saving Money Vulnerability Administrator Tech Terms Augmented Reality BDR Hardware Firefox Update Data Management IBM Mobile Office PowerPoint Google Drive Competition Web Server Hotspot Human Error Internet Exlporer YouTube Data Security Application Managed IT Service Work/Life Balance Cybersecurity Android Apple Remote Monitoring Data Breach Break Fix Software as a Service Mobile Device Geography Motion Sickness Downloads Utility Computing Microsoft Fun Compliance Bluetooth Digital Payment Internet Recycling Windows 10 Social Networking Marketing Identities Network Security Analyitcs Cloud Computing Printing IP Address Office 365 Hosted Solutions Mobile Device Management Holiday Processors Piracy Best Practices IT Services Writing Outlook Antivirus Legislation Google Docs Productivity Machine Learning Recovery Hiring/Firing Social Identity Password Windows 10 Analytics Data loss Smart Tech App Asset Tracking Motherboard Programming Documents Hard Drives Drones Communication Mobile Computing Phishing Data Recovery Cables Education Remote Worker OneNote Taxes Safety Government Error Monitors G Suite Managed IT services WiFi Bring Your Own Device Website Software Tips Digital Firewall VoIP

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...