Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Get Rid of Those Pesky Extra Cables

How To Get Rid of Those Pesky Extra Cables

Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuffed in a junk drawer or in a random box that they’ve kept “just in case.” Every home or business has the same scenario going on: lots of wires and cables left over from all the e-waste they have discarded over the years. If you want to get rid of your unwanted cables, here are a couple of tips on how to do so properly.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Trending Downtime Time Management Managed Service Provider G Suite Authorization Notifications Outsourced IT Email Internet Office Router Browser Break Fix Corporate Profile Tech Support Identity Botnet Fleet Tracking VoIP WPA3 Public Cloud Word Ransomware Zero-Day Threat Troubleshooting Scary Stories Tip of the week Management Tech Term Development Procurement Drones Phishing Infrastructure Cabling Display Computing Infrastructure Backup Virtual Desktop CCTV Permissions Point of Sale Spyware Update Marketing Mobile Data Digital Physical Security Applications Telephony Monitoring Identities Wireless eWaste Internet of Things Downloads Operations Money Mobile Device Automation Black Market Google Maps VoIP Bring Your Own Device Remote Monitoring and Management Website Managed IT services IT Support Superfish USB Tech Terms Instant Messaging Save Time YouTube Humor Cryptocurrency Encryption Writing Productivity Document Management LiFi Data Backup Chatbots PowerPoint Buisness Remote Workers Programming Data Breach Malware Customer Relationship Management Technology Laws Language Monitors Settings Small Business Unified Threat Management Analyitcs Backup and Disaster Recovery Administrator Hotspot Outlook Business Save Money Virtual Assistant User communications Vendor Management Google Calendar Access Control Business Owner Server Cameras Managed Service Software as a Service Going Green Uninterrupted Power Supply Cost Management Bluetooth Social Modem Presentation Notes Mobility Processors The Internet of Things Hackers WannaCry Recycling HIPAA Hacks Security Cache Health Servers How To Data Recovery Digital Payment Augmented Reality Business Growth Cleaning Typing Social Engineering Server Management Android Mobile Office BDR Office 365 Backups Gadgets Files Test File Sharing Supercomputer Hacking Managed IT Services Customer Service Data Warehousing Remote Computing Business Continuity Content Filtering Lithium-ion Battery Managed Services Provider Consumers Public Speaking Business Computing ROI Network Congestion Mail Merge Multi-Factor Security Authentication Proactive IT Emoji Communication Motion Sickness Retail Robot Connectivity Wireless Technology Machine Learning IT Budget Google Docs Private Cloud IT Technicians Work/Life Balance GPS Features Relocation Safety Software Tips Storage Intranet Information Technology Comparison Chromebook Telephone Systems Unified Communications User Error Star Wars Google Wallet Computers Cooperation Touchscreen RMM Hosted Solution BYOD Disaster Recovery Automobile Alert App Hardware Project Management Patch Management Voice over Internet Protocol Scam Identity Theft Hard Drives High-Speed Internet Government 5G Legal Information Distributed Denial of Service Digital Signature Recovery Vulnerabilities Disaster Address Smartphone Knowledge Saving Time Innovation Motherboard Microsoft Office Bandwidth Internet Exlporer Net Neutrality Dark Web Employees CIO Personal Information Computer Care Mobile Device Managment Travel Law Enforcement Paperless Office How To Remote Worker Printing Hiring/Firing Permission Windows 7 Cloud Computing Assessment Crowdsourcing Cables Entrepreneur iPhone Quick Tips Firefox Blockchain Managing Stress Cybercrime Firewall Data storage Regulations Shortcut Staffing Mobile Users Professional Services Mobile Device Management Apps Samsung Webcam Flexibility Help Desk Privacy IoT Taxes Company Culture Windows Web Server Smartphones Laptop Twitter Vulnerability Screen Reader Current Events Disaster Resistance Migration Tracking Data Management IT Services Documents Politics Administration Networking Business Management Legislation Computer Repair Undo Antivirus Wasting Time IT Support Virtual Private Network PDF Phone System Virtualization Read Only Microsoft Consultation Maintenance Theft Halloween Technology Tips Network Co-managed IT Chrome Password Sports Two-factor Authentication Compliance Search Alerts WiFi Business Technology Productivity Gmail Fraud Cybersecurity Tip of the Week Mouse Techology Refrigeration Licensing Data Security Mobile Computing OneNote Competition Artificial Intelligence Fun Business Intelligence Electronic Medical Records Domains Mirgation IT Consulting Gadget Software Best Practices Database Unsupported Software Network Security Sync Wi-Fi Nanotechnology Finance User Tips Geography Operating System Meetings Cortana Network Management Risk Management Cyberattacks Miscellaneous Unified Threat Management Conferencing Technology Microsoft Excel Enterprise Resource Planning Specifications Cookies Lenovo Data Saving Money Hard Disk Drive Asset Tracking Managed IT Service Mobile Devices 3D Printing Cyber Monday Bookmarks Printer Google Collaboration Bitcoin Staff Heating/Cooling Passwords Utility Computing VPN Tablet Apple Environment Employee-Employer Relationship Managed IT Efficiency Experience SaaS Black Friday Workplace Tips Statistics Favorites Hard Drive IP Address Hacker E-Commerce IBM Financial Budget Deep Learning Dark Data End of Support Data loss IT Consultant History Spam Cloud Analytics Error IT solutions Enterprise Content Management Employer-Employee Relationship Windows 10 Avoiding Downtime Healthcare Social Networking IT service Human Error MSP Social Media IT Management Computer Education Proactive Windows 8 Virus Redundancy Solid State Drive Upgrade SharePoint Piracy Application Electronic Health Records Big Data Best Practice Running Cable Mobile Security Wearable Technology Training Websites Holiday Google Drive Smart Tech Virtual Reality Windows 10 Computing Hosted Solutions Facebook Wires Alt Codes Consulting Upgrades Remote Monitoring Security Cameras Office Tips Smart Technology

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...