Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Management Save Money USB Samsung Saving Money Unified Threat Management Technology Laws Help Desk Processors IP Address Network Management Point of Sale Avoiding Downtime Customer Service IT solutions Files Social Engineering How To Digital Payment Gadget HIPAA VoIP Remote Computing Virtual Assistant RMM Spam Crowdsourcing Backup Motion Sickness Automation The Internet of Things Virtual Private Network Customer Relationship Management Network Security Digital Signature Undo Notes Conferencing Alerts Star Wars Remote Worker History Augmented Reality Workplace Tips Email Employees Electronic Medical Records Physical Security IT Consulting End of Support Data Recovery Vendor Management Internet of Things Scam Running Cable Digital Data storage G Suite Antivirus SaaS Google Calendar Data Breach Office 365 Cooperation Cables Mobility Mobile Security High-Speed Internet Cost Management Smartphone Productivity Mirgation Proactive IT Financial Employee-Employer Relationship Wi-Fi PowerPoint Cybercrime Webcam Authorization Windows 8 Settings Document Management Patch Management communications Managed IT Service Apple Two-factor Authentication Infrastructure IT Technicians Mail Merge Competition Utility Computing Passwords MSP Dark Data Wearable Technology YouTube Development eWaste Office Asset Tracking Lenovo Procurement Licensing Small Business Server Read Only Motherboard Hosted Solution Knowledge Voice over Internet Protocol Experience Security IoT Vulnerabilities Emoji Unsupported Software Artificial Intelligence Managed IT Notifications Wires Outlook Operating System Features Managed Service Provider Maintenance Statistics Google Docs Cameras Bookmarks Uninterrupted Power Supply VPN Solid State Drive Operations Chatbots Google Computing Save Time Upgrade Health Google Wallet Data Management Virtual Desktop Transportation Going Green Manufacturing Downtime 3D Printing Redundancy IT Management Employer-Employee Relationship Computer Care Mobile Device Websites Android Display Bring Your Own Device Vulnerability Consumers Cybersecurity Tech Support App Education Google Drive Disaster Resistance Data Backup Computers OneDrive Corporate Profile Hotspot Address Distributed Denial of Service Facebook Cookies Automobile Monitoring Spyware Trending Managing Stress Downloads Paperless Office Social IT Budget Options Ransomware Cloud Computing Managed IT services Bitcoin Environment Money Software Tips Communication Solid State Drives Wasting Time Assessment User Screen Reader Human Error WPA3 Co-managed IT Recovery Hiring/Firing Regulations BDR Net Neutrality Technology Legislation Teamwork Connectivity Mobile Office Fraud Business Computing Backups Politics Database SharePoint Cloud Government Windows 7 E-Commerce Mobile Device Management VoIP Staff Superfish Outsourced IT Data Warehousing Tech Term Cyberattacks Project Management IT service Virtual Reality Taxes Bluetooth Proactive Microsoft Office Business Intelligence IT Support Word Shortcut Smart Technology Social Media Authentication Flexibility Saving Time Mouse Fun Relocation Humor Virtualization Buisness Quick Tips Laptop Error Tip of the Week Favorites Hard Drive Drones Data Security Unified Threat Management Data loss Efficiency Legal Documents Troubleshooting Enterprise Content Management Mobile Travel Compliance Nanotechnology Printing Disaster Administration Retail Miscellaneous Software as a Service 5G Password Holiday Recycling Information Safety IT Consultant Wireless Application Web Server Router Access Control Hard Disk Drives Private Cloud Information Technology Software Geography Scary Stories Deep Learning Servers Smartphones Chrome Firefox Machine Learning Update Business Management Alt Codes Permissions Tablet Tracking Writing Virus Specifications Hacking Telephony Domains Hardware Personal Information Electronic Health Records Consulting Identities Identity Bandwidth Shared resources Computer Cleaning User Tips Identity Theft Tech Terms Presentation Migration Remote Monitoring and Management Analyitcs Privacy Mobile Device Managment Cache Security Cameras Permission Risk Management Cryptocurrency Professional Services Phishing Consultation Monitors Cyber Monday BYOD Managed Service Test Hacks Black Friday Refrigeration Law Enforcement Supercomputer Business Continuity Mobile Devices Computer Repair Alert Cortana Office Tips Applications CIO Lithium-ion Battery Sports Mobile Data Halloween WiFi ROI Internet Exlporer Marketing Disaster Recovery Productivity Business Owner Printer Fleet Tracking Analytics Data Blockchain Botnet Managed Services Provider Managed IT Services Theft Business Technology Zero-Day Threat Public Cloud Typing Server Management Microsoft Excel Hosted Solutions Programming CCTV WannaCry Current Events Windows 10 Storage Best Practice Techology Upgrades Hacker Touchscreen Business Wireless Technology Business Growth Robot Break Fix Firewall Enterprise Resource Planning Encryption Website Piracy Users Smart Tech Apps Heating/Cooling Comparison Entrepreneur Instant Messaging Technology Tips Multi-Factor Security Hard Drives Language Computing Infrastructure Time Management Phone System Unified Communications Hard Disk Drive IT Services Innovation Sync Windows File Sharing Finance LiFi Remote Monitoring IBM Network Congestion Staffing Hackers Cabling Remote Workers User Error Microsoft Dark Web Company Culture iPhone IT Support Intranet Telephone Systems Mobile Computing Work/Life Balance Healthcare Browser Black Market How To Chromebook Training Collaboration Backup and Disaster Recovery Social Networking OneNote Search Windows 10 Big Data GPS Gmail Networking Malware Budget Gadgets Twitter Modem Best Practices Content Filtering PDF Google Maps Meetings Public Speaking Tip of the week Administrator Network Internet

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code dieser Seite