Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Productivity Cookies Password User Supercomputer Hard Drives Drones Remote Computing Firewall Hiring/Firing Websites iPhone Asset Tracking Cryptocurrency Mouse Test Mobile Computing IT Consultant Information Technology Innovation Holiday Piracy Remote Monitoring and Management IT Budget GPS Artificial Intelligence Technology Tips Entrepreneur Computer Repair Data Windows 8 PowerPoint Domains Downtime Presentation Risk Management Processors IT service Computer Care Digital Signature Heating/Cooling VoIP Training Virtualization Telephone Systems LiFi IT Support Saving Time Patch Management Migration Proactive Business Growth Backup Applications Environment Writing Virtual Desktop Flexibility Authorization Gadgets Augmented Reality Document Management Save Money Saving Money Apple Travel Government How To Error Conferencing Chatbots eWaste Cybersecurity ROI Mobility Internet of Things BYOD Backups Managing Stress Phishing Gadget Communication App Enterprise Resource Planning Virtual Reality Disaster Windows Work/Life Balance Windows 10 Router Networking Mobile Device Staffing Cybercrime Computers Typing Server Collaboration Security Money Webcam Legislation Relocation Unified Threat Management Law Enforcement Data Warehousing Meetings Health Corporate Profile BDR Scam Managed IT PDF Downloads Cleaning Small Business Hackers Analytics Cyber Monday Software Operations Shortcut Bitcoin Users Procurement Smartphone End of Support Zero-Day Threat Current Events Antivirus Public Speaking Tablet Word Business Continuity Privacy Lithium-ion Battery Mobile Data Lenovo Unified Threat Management Features Gmail High-Speed Internet Google Calendar Management Facebook Settings WannaCry Refrigeration Data storage Vulnerabilities Digital Payment Mobile Devices Geography Twitter Maintenance Remote Monitoring How To Black Friday Tracking Cloud Computing File Sharing Business Intelligence Wires Network Data Breach Ransomware Printing Unsupported Software Tech Term Hosted Solutions Apps Undo Alt Codes Printer Personal Information Managed IT Service Upgrade Business Bookmarks IT solutions Software as a Service Samsung Microsoft Managed Service Provider Proactive IT Save Time Employees Experience Business Computing Wi-Fi Point of Sale Software Tips Going Green Blockchain Technology Backup and Disaster Recovery Marketing Utility Computing 3D Printing Computing Server Management Paperless Office Modem Theft Information Legal Unified Communications Automation Mail Merge Network Congestion Retail Wearable Technology Budget Redundancy Productivity Hard Disk Drive Google Maps Google Docs Superfish Wireless Technology Bluetooth IoT Hosted Solution Upgrades Remote Worker Dark Web Cabling Human Error Star Wars Spam Consumers IBM Office Tips WiFi Consulting Big Data Time Management Electronic Health Records Hard Drive Fleet Tracking Cost Management Identity Theft Web Server Two-factor Authentication Data loss Robot Tip of the Week Dark Data Business Technology Alerts Managed Services Provider Programming Data Security Storage Politics Language Best Practice Network Management Hacker Internet Exlporer G Suite Browser Vulnerability Managed IT services Consultation Chrome Compliance Remote Workers Managed Service Business Owner Cameras Miscellaneous Business Management Authentication Healthcare Assessment Company Culture Content Filtering OneNote Sports Update Documents Data Management Monitoring Network Security Administrator Black Market Co-managed IT Mobile Device Managment Enterprise Content Management communications IT Consulting IT Management Data Backup Machine Learning USB Uninterrupted Power Supply Files Fun SharePoint Motherboard Internet Disaster Resistance Tech Support SaaS Spyware Hardware Recycling Customer Service RMM Net Neutrality Efficiency Smartphones Address Access Control Computing Infrastructure User Tips Cortana Bandwidth Cloud MSP Recovery Employer-Employee Relationship Virtual Private Network Wireless Email Favorites Website Halloween Solid State Drive Google Drive Outlook Hacks Analyitcs Mirgation Automobile CIO Private Cloud Mobile Device Management Firefox Infrastructure Buisness Tip of the week IP Address 5G Multi-Factor Security Break Fix Social Media Permissions Google Tech Terms Windows 10 WPA3 Managed IT Services Smart Tech Cache Operating System Passwords Mobile Security Cyberattacks Android Malware Encryption IT Support Social Networking Administration Application Techology Microsoft Office Read Only Employee-Employer Relationship Humor Avoiding Downtime Identities Touchscreen CCTV Notifications Instant Messaging Education Digital Office HIPAA Alert Fraud Deep Learning Specifications Screen Reader Social Engineering Disaster Recovery Electronic Medical Records Permission Computer Office 365 Quick Tips Smart Technology Bring Your Own Device Identity Staff Financial Botnet Hacking Social Google Wallet VPN Competition Development Chromebook Mobile Motion Sickness Technology Laws Taxes Customer Relationship Management Knowledge Telephony Virus Workplace Tips Physical Security Cooperation Public Cloud IT Services Help Desk VoIP Safety Best Practices Crowdsourcing Security Cameras Running Cable Troubleshooting User Error Servers Nanotechnology Hotspot Sync E-Commerce Comparison Phone System Project Management Scary Stories History Monitors Data Recovery Distributed Denial of Service Display Trending Vendor Management Cables Licensing YouTube The Internet of Things Intranet Search Statistics IT Technicians Finance Mobile Office Connectivity Regulations Emoji Outsourced IT Laptop Microsoft Excel

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...