Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Storage Data Warehousing Read Only Mirgation Marketing Google Drive Access Control Word Artificial Intelligence Ransomware Cyber Monday Telephone Systems Android Trending Mail Merge Address Security Servers SaaS Encryption Taxes Remote Worker Social Media Notifications Fleet Tracking Telephony Intranet Law Enforcement Miscellaneous Cryptocurrency Communication Remote Computing YouTube App Remote Monitoring Windows 10 Server Machine Learning Enterprise Resource Planning Save Time Data Breach Maintenance Politics Saving Time Mobile Security Distributed Denial of Service Email MSP Collaboration Hacking Application Sports Microsoft Excel Knowledge Apps Virtual Private Network Computing Infrastructure Proactive IT Internet of Things Processors Presentation Wearable Technology Data Dark Data Solid State Drive Authentication Proactive Consumers Going Green Search Chromebook Google Calendar IT Consulting Cost Management E-Commerce Identities Wi-Fi Risk Management Network Management Smartphones Computer Care Business Management Facebook Webcam Identity Theft Error Undo Management Shortcut Redundancy Programming Tip of the week Virtual Desktop Tech Terms IT Services Websites Deep Learning Typing Data Backup Remote Workers Downtime Data Recovery Lenovo Smart Tech Experience VoIP Cleaning Finance Document Management User Error Augmented Reality Permission Productivity OneNote Gmail PDF Notes VoIP Managed Service Provider SharePoint IT Technicians Business Technology Blockchain Mobile Device Management Save Money Time Management Fun Staff Environment Test IBM Windows HIPAA Emoji Legal Relocation Monitoring Workplace Tips Electronic Medical Records Holiday Halloween Black Friday Education Licensing Mobile Office Smartphone Motherboard Mobile Computing Windows 8 Social Malware Disaster Resistance CIO Office Tips Cache History Upgrade Business Operations Star Wars Authorization USB Backup and Disaster Recovery Google Docs BDR How To Staffing IT Consultant Managed IT services Computer Repair Password Mobile Devices Virtual Reality Network Congestion Lithium-ion Battery Hard Drive Business Intelligence IP Address Troubleshooting Virtual Assistant Electronic Health Records Unsupported Software Bandwidth Files Professional Services Spam Content Filtering Language Display Bring Your Own Device Cloud Computing WiFi Database Documents Healthcare Robot Google Wallet Instant Messaging Mobile Data Refrigeration User Statistics Social Engineering Operating System Outsourced IT Hosted Solution Tip of the Week Flexibility Firefox Google Small Business Information Technology Security Cameras Innovation Recycling Router Vulnerability Backup CCTV Managed IT Service File Sharing Project Management Regulations Employer-Employee Relationship Specifications Settings Business Owner IT solutions Windows 7 Heating/Cooling Alerts Legislation Cortana Company Culture Users Mobile Device Managment Hackers Supercomputer Automation Migration Virtualization IT Support Passwords Hacks Patch Management Vendor Management Disaster Disaster Recovery Outlook Personal Information Theft Development Business Growth G Suite Customer Relationship Management Apple WannaCry Analytics Enterprise Content Management Applications Best Practice Permissions Hosted Solutions communications Downloads Cabling Tech Term Zero-Day Threat Buisness Windows 10 Information Firewall Managed Service Productivity Computers Technology Laws Mouse WPA3 Nanotechnology IT Support Crowdsourcing Spyware Phone System Touchscreen Digital Signature Cooperation Sync Asset Tracking Point of Sale Quick Tips Wireless Technology Big Data Data loss Wireless Data Management IoT User Tips Competition Digital Paperless Office Co-managed IT VPN Physical Security Chatbots Cameras Net Neutrality Technology Unified Communications Vulnerabilities Hard Drives The Internet of Things Bookmarks Managed Services Provider Wires Automobile Administration Mobile Device Black Market Business Computing How To Multi-Factor Security Piracy Update Employees Cybersecurity Tech Support Software Employee-Employer Relationship Microsoft Office 365 Infrastructure Software as a Service Managed IT Managed IT Services Computer Geography Cyberattacks Retail Saving Money Gadgets Human Error Hard Disk Drive Consultation Network Security Internet Exlporer Domains Server Management Cables Favorites RMM Cookies Office eWaste Meetings Twitter Features Unified Threat Management ROI Gadget Compliance Managing Stress BYOD Backups Laptop Antivirus Hiring/Firing Unified Threat Management Cloud Smart Technology Superfish Data Security 5G Connectivity Travel Bluetooth Assessment Writing Digital Payment Humor Voice over Internet Protocol Customer Service Samsung Work/Life Balance Current Events Scary Stories Wasting Time Web Server iPhone Hotspot Motion Sickness Software Tips Printing GPS Consulting Business Continuity Avoiding Downtime Fraud High-Speed Internet Botnet Tracking 3D Printing Administrator Health Government Dark Web Drones Privacy Entrepreneur IT Management Hardware Training Identity Efficiency Virus LiFi Uninterrupted Power Supply Phishing Upgrades Chrome Hacker Safety Screen Reader Help Desk PowerPoint Printer Scam Procurement Private Cloud IT Budget Break Fix Money Monitors Mobile Public Cloud Alert Social Networking Tablet Financial Techology End of Support Corporate Profile Conferencing Budget Remote Monitoring and Management Computing Network Website Bitcoin Google Maps Analyitcs Technology Tips Browser Utility Computing Internet Networking Cybercrime Mobility Best Practices Microsoft Office Running Cable Public Speaking Alt Codes IT service Modem Two-factor Authentication Data storage Recovery Comparison

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code