Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Hilarious Computing Tips From Mr. Wolfdog [VIDEO]

b2ap3_thumbnail_oh_your_wolfdog_400.jpgHappy April Fool’s Day! It’s a time to celebrate pranks, practical jokes, and laughter. Therefore, we thought we’d mix it up a bit and seek out technology advice from the funniest and the furriest CEO we know, Old Spice’s wolf-dog hybrid, Mr. Wolfdog!

Continue reading

Unsent IE Error Reports Uncovered, You Won’t Believe Where!

b2ap3_thumbnail_old_ie_error_reports_400.jpgEven if you like Internet Explorer, you may have noticed that it can be a bit buggy at times. Perhaps if Microsoft had more information about the causes of its software issues, they could develop a better product. This is the purpose of software error reports, which largely go unsent and unread; or at least, that’s what Microsoft thought.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Google Wallet Regulations USB IT Budget Hosted Solutions Word IT Consulting Technology Tips Tracking Scary Stories Mirgation Web Server Public Speaking Business Intelligence Small Business Outlook Licensing The Internet of Things Digital Signature Meetings Paperless Office Humor Backups Remote Workers Typing Virtual Desktop Computing Technology Laws Wi-Fi Legal Virtual Reality How To Google Calendar Cameras Money Efficiency Safety Business Continuity Storage Botnet Connectivity Internet of Things Workplace Tips Managing Stress Sports Migration Dark Data Cabling Search Office Tips File Sharing Smart Technology User Tips Information Technology SaaS Redundancy Cryptocurrency Security Business Computing Samsung History Mobile Data Internet Exlporer Bring Your Own Device Managed Service Data PDF Emoji Managed Service Provider CIO Fun Office Bluetooth Consumers Gadget Business Growth iPhone Disaster Recovery Remote Monitoring and Management Unsupported Software Cache Microsoft Excel Mobile Device Managment IT Technicians Favorites Running Cable Unified Threat Management Cables Authentication Data Backup Refrigeration Information How To Tablet Tech Terms Hard Drive IT service Cybercrime Entrepreneur Hacking Internet Data Management Electronic Health Records Assessment Writing Software Ransomware Screen Reader Update Email Lithium-ion Battery Wireless Technology Wearable Technology Windows Cost Management Patch Management Competition Software Tips IoT Automobile Website Processors Hard Disk Drive VoIP Microsoft Office Business Technology Finance CCTV Save Money Law Enforcement Bookmarks Avoiding Downtime Net Neutrality Data Security Display Marketing Environment Employee-Employer Relationship Intranet Motherboard Proactive End of Support Notes Uninterrupted Power Supply Healthcare Tip of the week Apps Firefox YouTube Outsourced IT Compliance Network Management Specifications Heating/Cooling Company Culture Chatbots Downtime Consultation VPN Analyitcs Upgrade Unified Threat Management Development Remote Monitoring Halloween Backup Operations Education Professional Services Employees Co-managed IT Data Warehousing BDR Procurement Address Bitcoin Tip of the Week Electronic Medical Records 3D Printing Privacy Lenovo Modem Tech Support Employer-Employee Relationship Retail Saving Money Test Zero-Day Threat Proactive IT Asset Tracking Blockchain Settings Files Conferencing Alert Downloads Social Media Training Managed IT services Telephony Vendor Management Printer Best Practices Notifications Features Password Mobile Device Management Twitter Vulnerabilities Remote Computing Analytics Recycling Domains Touchscreen Wireless Statistics Social Networking Printing Mobile Collaboration Smartphones WPA3 Saving Time IT Support Mobility Managed IT Service Buisness High-Speed Internet Comparison Public Cloud WannaCry Enterprise Resource Planning Webcam Legislation Holiday Financial Multi-Factor Security Machine Learning Administrator Travel Monitoring IT Support Corporate Profile Theft Cloud Data Breach Vulnerability Mobile Office Google Drive Black Market Distributed Denial of Service Cloud Computing Mouse Bandwidth Document Management Maintenance Managed Services Provider SharePoint BYOD Staffing Users Relocation Fleet Tracking Hard Drives Voice over Internet Protocol Two-factor Authentication Trending WiFi Virtual Assistant Managed IT Computer Care Motion Sickness Phishing Piracy Disaster Sync Cybersecurity Business Owner Google Docs Virtualization Network Congestion Scam Alt Codes Automation Remote Worker Budget Mobile Device Network Security Smartphone Websites Hiring/Firing Microsoft Technology App Consulting Communication Government Knowledge 5G Identity Hackers Data storage Recovery Authorization VoIP Mobile Computing Gadgets IT Services Phone System Computers Hacker Black Friday Application Risk Management Instant Messaging Save Time Digital Fraud Passwords Windows 7 Digital Payment Augmented Reality Office 365 Google Maps Server Management Windows 10 Data loss Virus OneNote Cooperation Router Error Infrastructure Hotspot Shortcut Time Management Health Cortana Presentation Hardware Database Artificial Intelligence Virtual Private Network Staff Alerts Read Only Laptop Content Filtering Monitors Administration Cleaning Wasting Time Personal Information Drones IT solutions Managed IT Services G Suite IT Management IP Address Management Programming PowerPoint Crowdsourcing Work/Life Balance Unified Communications Robot Social Best Practice Hacks Chrome Telephone Systems Google Quick Tips Troubleshooting Firewall Mobile Security Permission Current Events Politics Identities RMM MSP Upgrades Servers Operating System Business Computing Infrastructure Experience IBM Flexibility Software as a Service communications Language Taxes Network Productivity Security Cameras Innovation Computer User Geography Break Fix Cyber Monday Wires HIPAA Antivirus Miscellaneous Techology Data Recovery Identity Theft Spam Customer Relationship Management Physical Security Point of Sale Access Control Facebook Help Desk Chromebook IT Consultant Project Management Utility Computing Social Engineering Encryption Disaster Resistance Windows 10 Malware Windows 8 Deep Learning Tech Term Enterprise Content Management Cookies Star Wars Documents eWaste LiFi User Error Gmail Undo Backup and Disaster Recovery E-Commerce Mail Merge Permissions GPS Solid State Drive Business Management ROI Networking Productivity Nanotechnology Apple Customer Service Superfish Dark Web Browser Human Error Big Data Supercomputer Mobile Devices Server Smart Tech Applications Hosted Solution Computer Repair Android Private Cloud Cyberattacks Spyware Going Green

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...