Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Hilarious Computing Tips From Mr. Wolfdog [VIDEO]

b2ap3_thumbnail_oh_your_wolfdog_400.jpgHappy April Fool’s Day! It’s a time to celebrate pranks, practical jokes, and laughter. Therefore, we thought we’d mix it up a bit and seek out technology advice from the funniest and the furriest CEO we know, Old Spice’s wolf-dog hybrid, Mr. Wolfdog!

Continue reading

Unsent IE Error Reports Uncovered, You Won’t Believe Where!

b2ap3_thumbnail_old_ie_error_reports_400.jpgEven if you like Internet Explorer, you may have noticed that it can be a bit buggy at times. Perhaps if Microsoft had more information about the causes of its software issues, they could develop a better product. This is the purpose of software error reports, which largely go unsent and unread; or at least, that’s what Microsoft thought.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

User Tips Virtual Private Network Migration User Error Staffing Distributed Denial of Service Tech Terms Antivirus Staff Read Only Customer Relationship Management Fleet Tracking Paperless Office Technology Big Data G Suite RMM Public Speaking Cookies Disaster Resistance Analyitcs Typing Conferencing Law Enforcement Business Owner Smartphone App CIO Technology Laws Downloads Financial Identities Managed IT Services How To Business Intelligence How To Holiday Break Fix IT Consultant Current Events USB Productivity Marketing YouTube Customer Service 3D Printing E-Commerce Legal Gadget Hacking Privacy Star Wars Information Meetings Monitors Websites Computer Repair Gmail Hacks iPhone Permission WannaCry Physical Security Point of Sale Taxes History Cybercrime Security Cameras Hackers Server Website 5G Drones Google Theft Personal Information Network Business Continuity Crowdsourcing Remote Workers Best Practice Company Culture Black Market Spam Applications Application Lithium-ion Battery Piracy Unified Communications Modem The Internet of Things Enterprise Content Management Hosted Solutions Touchscreen Data Recovery Zero-Day Threat Content Filtering Data Security Motherboard Virtual Desktop Hard Disk Drive Analytics Cortana Running Cable Budget Regulations Information Technology Statistics Specifications Features Firefox Phone System Display eWaste Google Drive Mobile Device Management Wireless Spyware Cloud Health Cost Management Maintenance Word Managed IT services Virtualization Unified Threat Management Undo Miscellaneous Two-factor Authentication Save Money Data Management Management Heating/Cooling Dark Data Cache Scary Stories BYOD MSP IT Budget Geography Google Calendar Quick Tips Wi-Fi Access Control Operations Social Engineering CCTV Software as a Service Healthcare Remote Monitoring Automation Windows Productivity Software Tips Proactive IT IT Support Saving Time Corporate Profile Google Wallet Networking Internet of Things Telephony Presentation Instant Messaging Servers Microsoft Excel Windows 10 Private Cloud Operating System Time Management Fraud Hiring/Firing Processors Identity Theft Bandwidth Network Security Twitter Business Computing LiFi Utility Computing Gadgets Technology Tips Collaboration Settings PDF Electronic Medical Records Malware Tip of the Week Disaster Webcam Passwords Mouse Managed Service Provider Enterprise Resource Planning IT solutions Chatbots Screen Reader Managed Service Workplace Tips Cabling Address Multi-Factor Security Augmented Reality Firewall Flexibility Vulnerability Apple Alerts Users File Sharing Asset Tracking Vendor Management Managing Stress Web Server Writing Money Co-managed IT Document Management SharePoint Business Smart Technology Travel Social Infrastructure WPA3 Search Development Black Friday Disaster Recovery Office Tips Cleaning Techology Procurement Microsoft Human Error Proactive Chromebook Internet Alt Codes Windows 10 Bluetooth Hotspot BDR Scam Consulting Intranet Error IoT Computing Infrastructure VoIP Hosted Solution Programming Education Trending Entrepreneur Notifications Hard Drives Assessment Mobile Device Mobile Tip of the week Remote Computing Redundancy Facebook ROI VPN Humor Training Business Growth Botnet Solid State Drive IT Technicians Data Warehousing Authentication Cameras Data storage Computers Password Comparison Troubleshooting Refrigeration Files Going Green Computer Care Hardware Help Desk Robot Dark Web Office Best Practices Software WiFi VoIP Cyber Monday Unsupported Software Experience Efficiency Identity Mobile Device Managment Work/Life Balance Buisness IP Address IT Management Bring Your Own Device Update Encryption Smart Tech Language Managed IT Superfish End of Support Domains Politics Bookmarks Google Maps Browser Emoji Tech Support Wires Mobile Office Finance Cryptocurrency Supercomputer Router Mobile Data communications GPS Administration Upgrade Remote Monitoring and Management Halloween Hard Drive Remote Worker Artificial Intelligence Innovation Risk Management Cables Blockchain Fun Documents Environment Managed IT Service Mirgation Nanotechnology Laptop Computer Cybersecurity Project Management Data loss Vulnerabilities Tech Term Chrome Recycling Printing Avoiding Downtime Compliance Microsoft Office Computing User Server Management Mobile Computing Knowledge Net Neutrality Ransomware Office 365 HIPAA Sync Tracking Wireless Technology Electronic Health Records Monitoring Data Breach Data Backup Bitcoin Communication Alert Safety Retail Apps Business Management OneNote Patch Management Backup and Disaster Recovery Employees Outlook Windows 8 Permissions Network Management Government Mobility Security Administrator Competition Shortcut Test Small Business SaaS Digital Signature Employer-Employee Relationship Digital Payment Backups Outsourced IT IT Consulting Consultation Hacker Digital Backup Licensing Virtual Reality Samsung Unified Threat Management Legislation IT service Mobile Devices Managed Services Provider Social Networking PowerPoint Saving Money Sports Cloud Computing Data Android Authorization Tablet Mobile Security Cooperation Deep Learning Motion Sickness Employee-Employer Relationship Smartphones Cyberattacks Email Consumers Favorites Relocation Public Cloud Machine Learning Storage Recovery Mail Merge Telephone Systems IT Support Lenovo IBM Save Time Business Technology Social Media Network Congestion Phishing Virus Upgrades Automobile Internet Exlporer IT Services Uninterrupted Power Supply Wearable Technology Printer High-Speed Internet Connectivity Google Docs Downtime

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...