Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Sets Itself Up Nicely With Windows Store Loophole

Microsoft Sets Itself Up Nicely With Windows Store Loophole

When you’re managing your business’s technology, you want to limit access to time-wasting applications and keep your employees from accessing the Windows Store. It just makes sense. Yet, for the businesses that want to restrict access to the Windows Store on Windows 10 devices, well, that’s too bad; Windows 10 Pro version 1511 just made your life a whole lot more difficult, unless you’re willing to pay extra for Windows 10 Enterprise edition.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

History Cache App Smartphones Legal Lithium-ion Battery Permission Documents Robot Chromebook Multi-Factor Security Mobile Data Hackers Wires Samsung Efficiency Paperless Office Finance Healthcare Computer Repair Blockchain Cooperation Telephone Systems Cabling Scam VPN Virtual Private Network Business Continuity Hosted Solutions Backup and Disaster Recovery Google Calendar IP Address Spyware VoIP Software Point of Sale Settings Save Money Virtualization Google Drive Google Maps Star Wars Alt Codes Internet of Things Remote Monitoring Managed Service Mobile Device Law Enforcement Twitter Wi-Fi Wearable Technology Passwords Managed IT services Software as a Service Emoji IT Consulting Marketing E-Commerce Migration Smartphone Proactive CIO Backup Collaboration Cybersecurity Artificial Intelligence VoIP Technology Botnet Redundancy Recovery Hotspot Connectivity IT service Managed Service Provider Office Phone System Electronic Health Records Dark Web Hosted Solution Disaster Resistance Microsoft Remote Computing Tablet MSP Network Congestion Mobile Security Windows 10 Bookmarks Mouse Android Retail Cost Management Internet Exlporer Touchscreen Financial WPA3 Travel Automation Network Patch Management SaaS Data Management communications Fraud Fleet Tracking Internet IT Management Data Backup Drones Electronic Medical Records Machine Learning Data storage Licensing Chatbots Data Privacy Apple Office Tips Tech Support Test High-Speed Internet Language Theft Management Project Management Motion Sickness GPS Holiday IT Services Wireless Technology Bandwidth Tech Term Cloud Writing Phishing User Customer Service Screen Reader 3D Printing Alert Hacker Compliance Legislation iPhone Data Breach Telephony Windows 8 Mobile Computing 5G Email Business Computing Nanotechnology Websites Corporate Profile Data Warehousing Big Data Education Application Digital Signature Upgrades Downtime Encryption Black Friday Supercomputer Distributed Denial of Service Lenovo Computing Infrastructure Infrastructure Outlook Mobile Office Employer-Employee Relationship Data Security Unified Threat Management Remote Monitoring and Management Consultation Bitcoin Smart Tech Tracking Operations Cyber Monday WannaCry Small Business Humor Computer Care Mobile Device Managment PowerPoint Automobile Net Neutrality Windows 10 Troubleshooting Remote Worker Productivity IT solutions Maintenance Files Sports Digital Payment File Sharing Facebook Deep Learning Experience Virtual Desktop Hardware eWaste Managed Services Provider Storage Apps Cameras Hacks Browser Cloud Computing Running Cable WiFi Users Digital G Suite Hacking Zero-Day Threat Human Error USB Government Modem Flexibility Display Motherboard Entrepreneur Vulnerability Password Environment Mobile Device Management Cleaning Productivity Webcam Bring Your Own Device Communication Technology Tips Black Market Server Disaster Recovery Update Consulting Alerts Spam Best Practice Information Health Website Money Mail Merge Shortcut Vulnerabilities Personal Information IT Support ROI Outsourced IT Crowdsourcing Security Cameras Operating System HIPAA Administration Hard Disk Drive Consumers Business Technology Sync Training YouTube User Error Business Owner SharePoint Backups Hard Drive Social Media Miscellaneous Tech Terms Staff User Tips Document Management Office 365 Mobile Applications Analyitcs Hiring/Firing Trending Disaster How To Web Server Unified Communications Computers Scary Stories Information Technology PDF Politics Co-managed IT Best Practices Buisness Access Control Meetings Break Fix Business Microsoft Office Public Cloud Computer Enterprise Content Management Innovation Microsoft Excel Software Tips Domains Printer Utility Computing Server Management Smart Technology Processors Workplace Tips RMM Chrome Development Identity Google Identity Theft Two-factor Authentication Monitoring IBM End of Support Data Recovery How To The Internet of Things Virus Going Green Servers Read Only Technology Laws Current Events Competition IT Technicians Search BDR Help Desk IoT Content Filtering Virtual Reality Cryptocurrency Uninterrupted Power Supply Remote Workers Specifications Saving Money Vendor Management Heating/Cooling Presentation Regulations Features Monitors Programming Antivirus Budget Private Cloud Typing Safety Company Culture Business Management Refrigeration Managed IT Services Proactive IT Risk Management Data loss Cybercrime Employee-Employer Relationship IT Support Security Tip of the Week LiFi Administrator Favorites Avoiding Downtime Instant Messaging Network Security Saving Time Permissions Intranet Authorization Notifications Social Wireless Malware Quick Tips Google Docs Recycling Cyberattacks Fun Network Management Procurement Assessment Asset Tracking Cookies Tip of the week Printing Public Speaking Undo Computing Windows Mobile Devices Halloween Augmented Reality Business Intelligence Physical Security Save Time BYOD Address Downloads Cortana Mobility CCTV Managed IT Service Statistics Firewall Geography IT Budget Business Growth Conferencing Gmail Google Wallet Ransomware Analytics Hard Drives Word Laptop Authentication Router Social Networking Upgrade Gadget Managed IT Comparison Staffing Dark Data Gadgets Cables Superfish Solid State Drive Social Engineering Employees Relocation Error Customer Relationship Management Time Management Enterprise Resource Planning Knowledge Piracy Unified Threat Management Unsupported Software Managing Stress IT Consultant Mirgation Techology Work/Life Balance Bluetooth Identities Firefox Networking OneNote Taxes

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...