Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Special Symbols

Tip of the Week: How to Type Special Symbols

The Internet has enabled businesses to establish relationships on a global scale. Now, an upscale restaurant in Minneapolis can use the Internet to order ingredients from a vendor in Bordeaux. However, there can easily be a language difference when doing business internationally. This is when it is fortunate that Windows 10 makes it so easy to change your device’s language.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Downtime Point of Sale Wireless Technology Remote Monitoring and Management Windows 10 Google Microsoft YouTube Retail Wires Disaster Resistance Star Wars Physical Security Staffing SharePoint Paperless Office Virtual Private Network Programming Asset Tracking Writing Cost Management Smartphones Language Best Practices Android Solid State Drive Taxes Deep Learning Augmented Reality Twitter Features IT Consulting SaaS Social Networking Hacks Hosted Solutions Environment Documents Productivity Software Tips Computer Break Fix Recovery Laptop Update Public Cloud Information Permission Smartphone Miscellaneous Tracking Black Friday Techology Electronic Medical Records BDR Managed Service Backups The Internet of Things Outsourced IT PowerPoint Server Management Recycling Government Tech Term Alert Users Education Tablet Maintenance Error Monitors Voice over Internet Protocol Wasting Time eWaste Upgrade Development Computing Infrastructure User Error Office Tips Remote Workers Identity Theft Windows 7 Phone System Save Money User Tips 3D Printing Sync Data Monitoring Applications Processors Work/Life Balance Hosted Solution Safety Files Hacking Save Time Microsoft Office Migration Identities Office 365 Network Buisness Hardware Hard Drive Business Continuity Business Computing OneNote Mobile Computing Access Control Security Cameras IoT Tech Terms Browser IT Consultant Wearable Technology Networking LiFi Management Bring Your Own Device Co-managed IT Address IT service Mobile Virtual Assistant Windows 8 Unified Threat Management Vulnerability Licensing Unified Threat Management Firefox Intranet Network Management Politics Data Backup Application Disaster Bluetooth Competition Webcam Mobile Device Chromebook Disaster Recovery Servers Travel Tech Support Vulnerabilities Patch Management WiFi Notifications IT Technicians Quick Tips Network Congestion Smart Tech How To VPN Unified Communications RMM IT Support Telephony Comparison HIPAA Small Business Electronic Health Records Malware Zero-Day Threat Domains Professional Services Email Machine Learning Business Growth Social Media Saving Time Troubleshooting Fleet Tracking Alt Codes Managed IT services Employees Heating/Cooling Procurement Website Experience Information Technology Google Drive Consultation Gadget Healthcare Security Instant Messaging Internet Public Speaking Chrome Help Desk Mobile Device Managment WannaCry Document Management Web Server Assessment Mirgation Blockchain Computer Repair Current Events Mobile Security Staff Technology Laws Hard Disk Drive Google Docs Server Workplace Tips Backup and Disaster Recovery Remote Monitoring Data loss Entrepreneur Ransomware Backup Favorites USB Smart Technology Hiring/Firing Managed IT Services Productivity VoIP Running Cable Password Human Error Administrator Net Neutrality Data Breach Company Culture Microsoft Excel Cloud Two-factor Authentication Flexibility Network Security IT Management Screen Reader Social Engineering Black Market Specifications Utility Computing Mobile Device Management Multi-Factor Security Storage Chatbots Cortana Digital Signature Going Green Fraud Antivirus Virus CCTV Bitcoin Legal Holiday Regulations Cabling Botnet Data Management File Sharing Spam Lithium-ion Battery MSP Automobile Employee-Employer Relationship Social Samsung Windows Managed IT Scary Stories IBM Hacker Facebook Money Geography Customer Relationship Management Cyber Monday Mobile Data Digital Payment Proactive Internet Exlporer Administration Artificial Intelligence Websites Google Maps Bandwidth Avoiding Downtime Office Project Management Refrigeration Health Superfish Proactive IT Telephone Systems Technology Tips Business Technology Encryption Computing Test Notes Google Wallet Read Only Big Data Conferencing Cybersecurity communications Printer Downloads Innovation Upgrades Settings Database Legislation Business Owner Word Sports Modem CIO Time Management Business Software as a Service Connectivity Apple Robot BYOD Compliance Passwords Lenovo Router Bookmarks Best Practice Relocation Tip of the Week Enterprise Content Management Customer Service Consulting Phishing User Shortcut IT Support E-Commerce Meetings Digital Data Recovery Gadgets Virtual Desktop Business Management iPhone Fun IT solutions G Suite Remote Computing Technology Windows 10 ROI End of Support Drones Virtualization Cache Analytics Hackers Personal Information Authorization Internet of Things Undo Cables 5G Privacy IT Budget Employer-Employee Relationship Business Intelligence Theft Authentication Financial Remote Worker Operations High-Speed Internet Distributed Denial of Service Data storage Cookies Nanotechnology Presentation Cloud Computing Content Filtering Risk Management Motion Sickness Crowdsourcing Mail Merge Spyware Hard Drives Private Cloud Law Enforcement Dark Web Training Gmail Managed IT Service Unsupported Software PDF Wireless Managed Service Provider Virtual Reality Halloween Motherboard Emoji Marketing Firewall History Cybercrime Infrastructure Corporate Profile Cleaning Piracy Operating System Apps Mouse Touchscreen Cooperation Outlook Efficiency Scam Consumers Communication Mobility VoIP Display Hotspot IP Address Mobile Office Budget Tip of the week Wi-Fi Statistics Uninterrupted Power Supply Trending Computers Mobile Devices Cyberattacks Alerts Search Automation Finance Cryptocurrency Managed Services Provider Humor Redundancy Google Calendar Typing Cameras Knowledge Enterprise Resource Planning Managing Stress WPA3 Data Security App Computer Care Software Saving Money Collaboration How To GPS Dark Data Identity Vendor Management Printing Permissions Data Warehousing Analyitcs Supercomputer IT Services

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...