Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Sets Itself Up Nicely With Windows Store Loophole

Microsoft Sets Itself Up Nicely With Windows Store Loophole

When you’re managing your business’s technology, you want to limit access to time-wasting applications and keep your employees from accessing the Windows Store. It just makes sense. Yet, for the businesses that want to restrict access to the Windows Store on Windows 10 devices, well, that’s too bad; Windows 10 Pro version 1511 just made your life a whole lot more difficult, unless you’re willing to pay extra for Windows 10 Enterprise edition.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Specifications Knowledge Managed IT Wasting Time G Suite eWaste Wearable Technology Superfish Cookies Windows 10 Managing Stress History User Tips Operating System Analytics Humor USB Technology Remote Worker Disaster Mobile Data Best Practices Computing Programming Social Engineering Microsoft Excel Managed IT Services VoIP Private Cloud Miscellaneous Bluetooth Modem Saving Money Automation IT Services Samsung Relocation Managed Service Provider Avoiding Downtime Wireless Technology SaaS Virus Microsoft Office Running Cable Language IBM Finance PDF Laptop Health Identity Tip of the week Migration The Internet of Things IT Support Fleet Tracking Operations Phone System Cybercrime Technology Laws Cache Data Data Security Telephone Systems Hard Disk Drive Smart Technology Emoji Disaster Resistance Point of Sale Google Drive HIPAA Business Intelligence Monitors Retail Virtual Reality Productivity Settings Downloads Asset Tracking Theft Hacker IT Budget Backup Network Congestion Fun Websites Data storage Collaboration Hosted Solution Gadget Innovation Conferencing Digital Signature Bitcoin Computing Infrastructure Smartphone Internet of Things Technology Tips Maintenance Downtime Read Only IT solutions Proactive Company Culture Co-managed IT Website PowerPoint Writing Alert Drones Information Lenovo Productivity App IT service Mobility Robot Development Cryptocurrency Human Error ROI Google Docs Document Management Holiday Twitter Network Management Fraud IT Technicians Chatbots Database Flexibility RMM Software Email Gadgets Android Screen Reader Vulnerability IT Management Save Money Time Management IP Address Halloween Botnet Big Data Geography Wi-Fi Business Mobile Office Black Market Google Calendar Mobile Device Management Voice over Internet Protocol End of Support Going Green iPhone Notifications Shortcut Business Owner Environment Hardware Licensing Cloud CCTV Digital Mirgation Dark Data Bring Your Own Device Consumers VoIP Politics Update VPN WiFi Procurement Remote Computing Search Recycling Cabling Sports Password Google Maps Domains Address Employee-Employer Relationship Gmail Crowdsourcing Artificial Intelligence Data Backup Bandwidth Electronic Health Records Security Cameras Facebook Firefox Chrome How To Best Practice Computer Care Tech Support Computer Repair Managed Service Utility Computing Upgrades Instant Messaging Cortana Browser Google Wallet Enterprise Resource Planning Uninterrupted Power Supply Ransomware Mobile Device Managment Government Blockchain Microsoft IT Support Software Tips Processors Favorites CIO Cyber Monday Communication Motherboard Tablet Storage Hard Drives User Error Dark Web Nanotechnology Business Computing Network Proactive IT Saving Time Computers 5G Presentation Malware Error Content Filtering Firewall Display Networking Passwords BDR Notes Router Competition Redundancy Supercomputer Typing Sync Windows 7 High-Speed Internet Scam Intranet Buisness Legislation Solid State Drive Financial Risk Management Test Antivirus Virtual Private Network Unified Communications Outlook Remote Monitoring and Management Cybersecurity Application Education Outsourced IT Troubleshooting Regulations Security Project Management Touchscreen Mobile Computing Paperless Office Piracy Net Neutrality Lithium-ion Battery IT Consulting IoT 3D Printing Save Time Comparison Virtual Assistant Meetings Statistics Vulnerabilities Unified Threat Management Word Entrepreneur Hackers LiFi Compliance Chromebook Business Growth Web Server Alerts Hard Drive Mobile Devices Webcam Hotspot Internet Exlporer communications Managed Services Provider Administration SharePoint Deep Learning Mouse Augmented Reality Cameras Office Tips Server Management Business Continuity Safety Public Cloud Customer Relationship Management Office Features Two-factor Authentication Access Control Wires Mobile Hacking Data Recovery Smart Tech Experience Tech Term Windows 10 Internet Infrastructure E-Commerce Analyitcs Identities How To BYOD Refrigeration Hacks Tracking Information Technology Backup and Disaster Recovery Motion Sickness Administrator Permissions Cooperation Users Employees Techology Remote Workers Trending MSP Star Wars Printing Scary Stories Alt Codes Tip of the Week Encryption Law Enforcement Tech Terms Cables Windows 8 Unsupported Software Files Electronic Medical Records Multi-Factor Security Consultation Apps Cost Management Disaster Recovery Social Media Printer Managed IT services Spyware Workplace Tips Hosted Solutions Black Friday Managed IT Service Authentication Data Warehousing Work/Life Balance Office 365 Apple Smartphones Help Desk Assessment Management WPA3 Mobile Device Vendor Management Spam IT Consultant Physical Security Servers Cyberattacks Staff Healthcare Virtual Desktop Server Bookmarks Privacy Data Breach Corporate Profile Network Security Wireless Upgrade Monitoring Consulting Patch Management Break Fix Machine Learning Social Telephony Staffing Social Networking Unified Threat Management Data loss Business Technology Efficiency Distributed Denial of Service Hiring/Firing WannaCry OneNote Money Remote Monitoring Small Business Customer Service Current Events Travel Computer Cloud Computing Backups Professional Services Software as a Service Data Management File Sharing Public Speaking Enterprise Content Management Marketing Authorization Recovery Permission Personal Information Heating/Cooling Budget Applications Google Digital Payment Documents Quick Tips Windows Virtualization YouTube Zero-Day Threat Business Management Legal User Employer-Employee Relationship Mobile Security GPS Training Taxes Undo Identity Theft Cleaning Phishing Mail Merge Automobile Connectivity

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...