Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Terminology: Bookmark

Tech Terminology: Bookmark

The Internet is home to a vast amount of knowledge. Undoubtedly you’ll find yourself revisiting certain sites more often than others to take advantage of the information contained within. Thankfully, the bookmark system is a great way to make this happen, giving users an easy and efficient way to navigate back to frequently-visited websites.

Continue reading
0 Comments

Tech Term: Cookies

Tech Term: Cookies

Browser cookies might not sound delicious, but they are a particularly important part of your browser’s technology. Do you actually know what they do, though? Today’s tech term will explain just what these cookies are, as well as the purpose they serve for your organization.

Continue reading
0 Comments

Tip of the Week: Tricks for Better Internet Browsing

Tip of the Week: Tricks for Better Internet Browsing

If you use the Internet every single day, you’ll start to realize that you can use it more effectively for achieving your goals. In cases like this, it’s important to look at ways you can improve your overall use of the Internet, as it’s the key way you access important information, applications, and contacts. Here are some day-to-day tips that you can use to help improve your mastery of the Internet.

Continue reading
0 Comments

Tip of the Week: Control Where Your Downloads Are Saved

Tip of the Week: Control Where Your Downloads Are Saved

Whenever you download a file from the Internet, the file will, by default, go to an aptly-titled folder in Windows called Downloads. Unless you change the default settings, your files will always be saved here. But what if you want to make it so that your downloads go somewhere else? You can accomplish this pretty easily. We’ll walk you through how to do it for some of the most popular browsers, including Google Chrome, Microsoft Edge, and Mozilla Firefox.

Continue reading
0 Comments

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

Continue reading
0 Comments

Windows 10 is Super Popular... Microsoft’s New Edge Browser, Not so Much

Windows 10 is Super Popular... Microsoft’s New Edge Browser, Not so Much

Have you upgraded your business’s workstations to Windows 10 yet? If not, you should ask yourself why you haven’t done so. However, if you have upgraded, you’re one of the 25.3 percent of people using Windows 10. Windows 10 seems to be a great hit among end-users, but Microsoft’s new browser, Edge, isn’t so fortunate.

Continue reading
0 Comments

Malvertising: Hackers are Paying For Ad Space on Popular Websites

b2ap3_thumbnail_click_on_malware_ad_400.jpgA good business practices extreme caution when using the Internet, thanks to hackers using any means possible to unleash threats against organizations of all sizes. You teach your employees how to avoid threats and to avoid suspicious websites, but what if that’s not enough to keep hackers out of your network infrastructure?

Continue reading
0 Comments

Tip of the Week: 5 Common Sense Tactics to Safeguard Your Online Identity

b2ap3_thumbnail_anonymous_internet_use_400.jpgThe Internet can be a dangerous place thanks to the anonymity it provides. Yet, this anonymity is limited, especially if you take part in questionable Internet browsing activities. Take, for instance, the hack of Ashley Madison, a website dedicated to cheating on one’s spouse. This July, a hacker group called the “Impact Team,” infiltrated the site and is now threatening to expose these cheaters.

Continue reading
0 Comments

5 Nifty Google Easter Eggs You Might Not Realize Exist

b2ap3_thumbnail_chome_easter_eggs_400.jpgGoogle is the world’s most popular search engine, and it’s grown so outrageously popular that there’s even a verb named after it; “to google” is to search for something on the Internet using Google. However, to this day, Google continues to surprise the public with fun Easter eggs, hidden functions which provide a level of entertainment to the user.

Continue reading
0 Comments

Windows 10, Spartan, HoloLens, and More: The Microsoft Live Event in Retrospective

b2ap3_thumbnail_windows_logo_10_400.jpgA few weeks ago, Microsoft presented several of their latest projects at a live event. As expected, there was a lot of focus put on the new Windows operating system, Windows 10, in addition to their in-development browser Spartan; but what we didn’t expect Microsoft to show off was a slew of brand spanking new consumer technologies.

Continue reading
0 Comments

Will You Make Microsoft’s Spartan Your Default Web-browsing Warrior?

b2ap3_thumbnail_windows_10_400_20150119-221737_1.jpgIn addition to Microsoft’s upcoming new operating system, Windows 10, the software company has released that there is a new web browser in production. This new browser, code-named “Spartan,” is expected to have similar functionality to Mozilla’s Firefox and Google Chrome, and will be released alongside Windows 10.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Gadget Authentication Business Technology Email The Internet of Things Compliance Fleet Tracking Assessment IT Services Cloud Computing Avoiding Downtime Small Business Tech Terms Content Filtering IoT Hard Drives Outsourced IT Patch Management Hacker Theft Language Smart Tech Machine Learning Fun Law Enforcement Upgrades Disaster Resistance Private Cloud Operations Internet Technology IT Technicians Undo Files Modem Environment Dark Web Smart Technology Backup and Disaster Recovery Tracking Hard Disk Drive Saving Time Website Wireless Managed Services Provider Google Docs Customer Relationship Management Virtual Desktop Office Tips Windows Redundancy eWaste PDF Cabling Notifications Government Passwords Hacks User Google Drive Hackers Webcam Data Recovery Mobile Devices Web Server Cost Management Automobile Mail Merge SharePoint Tablet Electronic Health Records Managed IT Services Apple Bitcoin Physical Security Malware Phishing Office Holiday Staff Cameras Identities Managed IT services Nanotechnology Best Practice Dark Data Cybersecurity LiFi Zero-Day Threat G Suite Hosted Solution OneNote Touchscreen Employer-Employee Relationship CCTV Help Desk WiFi Presentation Downloads Cyberattacks Halloween Managed IT Service Windows 10 Managed Service Virus Computer Bluetooth VPN Net Neutrality Business Piracy Chromebook IT solutions WPA3 Unified Threat Management Gadgets PowerPoint Facebook Break Fix USB Workplace Tips Personal Information VoIP Sync Utility Computing Collaboration Telephony Backups Miscellaneous Hiring/Firing Data Security Safety Internet Exlporer Consulting IT Consultant Digital Payment Social Engineering Public Cloud Superfish Router Smartphone Mobile Device Management Social Mobility Connectivity Procurement Chrome Wi-Fi Computing Hosted Solutions HIPAA Access Control Users Cybercrime Two-factor Authentication IT Support iPhone Read Only Network Congestion Mobile Office IT Budget Health Phone System Meetings Microsoft Excel Monitors Typing Computers Printer Vendor Management Disaster Websites Managed Service Provider Robot Browser Motion Sickness Blockchain Applications Digital Signature Point of Sale Productivity Google Wallet Managed IT Data loss Proactive IT Consultation Humor Programming Chatbots RMM Wireless Technology Microsoft Features Alerts Paperless Office Knowledge Domains Search Analyitcs Quick Tips Monitoring Cyber Monday Firefox Document Management Finance GPS Alt Codes Tech Support Healthcare Documents History Wearable Technology Communication Enterprise Resource Planning Human Error Experience Money Legislation Comparison IT Consulting Virtual Reality Cache Crowdsourcing Networking Corporate Profile Apps Cortana Hard Drive Education SaaS Work/Life Balance Time Management Software as a Service Saving Money Wires Upgrade Software Best Practices Star Wars Legal Development IT Support Mobile Project Management Administration Vulnerabilities Trending Supercomputer Business Intelligence Android Business Management Recycling Disaster Recovery E-Commerce Current Events Business Continuity Solid State Drive Geography Risk Management Screen Reader Managing Stress Techology Consumers Virtualization Mobile Computing Ransomware Multi-Factor Security Application Sports Office 365 Network Management Politics Operating System Big Data Unified Communications Mobile Data ROI Mobile Security Cryptocurrency Conferencing Business Computing Instant Messaging Tip of the week MSP Black Market Fraud Identity Theft Computing Infrastructure Vulnerability Motherboard Permissions Remote Worker Productivity Downtime Distributed Denial of Service IBM Mobile Device Authorization Cooperation Save Money Mobile Device Managment Telephone Systems Security Cameras Backup Proactive Co-managed IT Entrepreneur Migration End of Support Regulations Customer Service IP Address Hacking Data Backup BYOD Bookmarks Shortcut Cleaning Scary Stories Save Time Technology Tips Heating/Cooling Data Management Outlook Hotspot Alert Unsupported Software Social Media Management Bandwidth Password Public Speaking Display Network Security Smartphones Microsoft Office Efficiency Permission Emoji Identity Server Encryption Relocation Data Breach Tech Term Administrator Budget BDR Cloud Word Lithium-ion Battery Information Technology File Sharing Staffing Travel Data WannaCry Computer Care Windows 8 YouTube App Recovery User Error Favorites Financial Asset Tracking Analytics IT Management Firewall Server Management Cables Internet of Things Hardware Storage Virtual Private Network Google Maps Data storage Buisness Processors Laptop Privacy Electronic Medical Records Employee-Employer Relationship Scam Digital Intranet Gmail Training Retail Company Culture Software Tips Artificial Intelligence Bring Your Own Device Refrigeration Lenovo Taxes Uninterrupted Power Supply Address Maintenance Windows 10 Update Competition Augmented Reality IT service User Tips Servers Test High-Speed Internet Google Calendar Going Green Unified Threat Management 5G Data Warehousing Drones Remote Monitoring Flexibility Remote Monitoring and Management How To Twitter Spam Printing CIO Specifications Statistics communications Google Automation Remote Workers Tip of the Week 3D Printing Business Owner How To Writing Spyware Information Infrastructure Deep Learning Botnet Innovation Business Growth Black Friday Mirgation Marketing Security Antivirus Mouse VoIP Employees Remote Computing Technology Laws Enterprise Content Management Troubleshooting Cookies Running Cable Licensing Computer Repair Network Settings Social Networking Error Samsung

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code