Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Get Rid of Those Pesky Extra Cables

How To Get Rid of Those Pesky Extra Cables

Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuffed in a junk drawer or in a random box that they’ve kept “just in case.” Every home or business has the same scenario going on: lots of wires and cables left over from all the e-waste they have discarded over the years. If you want to get rid of your unwanted cables, here are a couple of tips on how to do so properly.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cooperation Backup Network Management Virtual Desktop Hacking Motherboard Nanotechnology Private Cloud Cookies Meetings Maintenance Alerts Mobile Office Spam Scam Data Business Continuity Training Enterprise Resource Planning IT Consultant Spyware Screen Reader iPhone VoIP IT Support Financial Enterprise Content Management Update Smartphone Managed Service Provider Apps Techology Display Procurement Samsung Computer Care Buisness Bandwidth Applications Geography Firewall Safety Physical Security Information Technology Statistics Managed IT Services Marketing Electronic Medical Records Document Management Going Green Fleet Tracking Tablet Managed Service Politics Printer Mobile Devices Halloween Webcam Best Practice Smart Technology Intranet Application Business Owner Current Events Cyberattacks Cyber Monday RMM Scary Stories BYOD Productivity Travel Artificial Intelligence Mobile Device Drones Collaboration Robot Network Congestion Multi-Factor Security Electronic Health Records Saving Money Computing Infrastructure Redundancy Piracy Windows 8 Specifications Mouse PowerPoint Government IT Services Chatbots Files Phone System Microsoft Excel IT service Alert Asset Tracking Alt Codes Small Business Communication Operating System IT Management Solid State Drive Blockchain Presentation Legal Data Breach Virtual Private Network Disaster Recovery Machine Learning Cortana Digital USB Vendor Management Finance Crowdsourcing Router Authentication Tech Term LiFi Gmail Touchscreen Tip of the week Identity CIO Data storage eWaste Internet Exlporer IT Consulting Competition Co-managed IT Money Wi-Fi Patch Management Business Growth Business Remote Computing Virus Work/Life Balance Network Recovery Proactive Malware Google Calendar Workplace Tips Users Data Management Cybercrime Error Disaster Assessment Privacy YouTube Regulations MSP Budget Operations Net Neutrality Data Recovery Technology Vulnerabilities Disaster Resistance Mobile Unified Threat Management PDF SaaS Proactive IT Quick Tips Chrome Smartphones Google Hiring/Firing Time Management Humor Employees Managed IT services End of Support Identity Theft Hosted Solution Office Retail Backups Servers How To Monitoring Paperless Office BDR Information Ransomware Cost Management Efficiency Technology Tips IT Budget Bitcoin Cameras Consulting Address Vulnerability Mobile Device Management Management Technology Laws Firefox Remote Worker Cloud Computing Public Cloud Upgrade Unsupported Software Staffing Legislation Computing Downloads Point of Sale Server Management Big Data Google Maps Botnet Upgrades Holiday Healthcare Best Practices IoT Outsourced IT E-Commerce Hacks Taxes Cryptocurrency Help Desk Employer-Employee Relationship Heating/Cooling Notifications Android Hacker Browser Language Gadgets Security Cameras Shortcut Hard Drives IP Address Entrepreneur Education Corporate Profile Writing Access Control Microsoft Office Development Migration Social Media Lenovo Telephony Windows 10 Utility Computing Bluetooth Sports Settings Staff Remote Monitoring and Management Computers Cache Connectivity Tip of the Week Digital Payment Tech Terms Emoji Risk Management Data Warehousing Bookmarks Antivirus Smart Tech Tracking User Error High-Speed Internet Hotspot Software as a Service Employee-Employer Relationship IT Support Flexibility Licensing Theft Distributed Denial of Service The Internet of Things Black Market HIPAA IT Technicians CCTV Dark Web 5G Gadget Downtime Networking Analytics Word Outlook Comparison App Cabling Hackers Read Only User Software Tips Passwords Web Server Microsoft Sync Backup and Disaster Recovery Running Cable Bring Your Own Device Administrator Managed IT Automation Mobile Data Star Wars Wireless Technology Administration Test Telephone Systems Printing Customer Service Permission Internet History Google Drive Content Filtering Uninterrupted Power Supply Google Wallet Remote Monitoring Network Security Business Management Mobile Security Trending Hard Disk Drive Typing Undo Zero-Day Threat Business Technology Software Mobile Computing Domains Hardware Cybersecurity Mobile Device Managment Computer ROI Fun communications Mobility Virtualization Health Monitors Automobile Twitter Human Error Managed Services Provider VoIP Company Culture Remote Workers Avoiding Downtime Fraud IT solutions Storage Saving Time WiFi Save Time Managing Stress Website Computer Repair WannaCry Refrigeration Hard Drive Cloud Mirgation Business Computing Managed IT Service VPN Wires Business Intelligence Email Programming Favorites Knowledge How To Augmented Reality Virtual Reality Cables Conferencing Infrastructure Windows Consumers Data loss Save Money Instant Messaging Modem Documents GPS Permissions Tech Support Social Engineering Consultation Public Speaking Personal Information Password 3D Printing Office Tips Cleaning Data Security Windows 10 Innovation G Suite User Tips Internet of Things Security Recycling Deep Learning Encryption Social Troubleshooting Google Docs Dark Data Data Backup Laptop Customer Relationship Management Law Enforcement Authorization Experience Productivity Hosted Solutions Websites Relocation Break Fix Server Mail Merge Processors Two-factor Authentication Office 365 Unified Threat Management Wearable Technology OneNote Digital Signature Chromebook SharePoint Compliance Identities Environment Motion Sickness Project Management Unified Communications WPA3 Wireless Supercomputer Miscellaneous Social Networking Search Superfish Features Phishing Facebook Apple Lithium-ion Battery File Sharing Analyitcs Black Friday IBM

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code