Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Mobile Devices Vendor Management Unified Threat Management Antivirus Telephone Systems Printer Managed Service Provider Motherboard Technology Tips Outsourced IT Bluetooth Business Employer-Employee Relationship Internet of Things Voice over Internet Protocol Ransomware Google Maps Social Media Law Enforcement Disaster Windows 7 Saving Time VoIP Fun Halloween Patch Management Digital Signature Features Maintenance Politics Mobile Device Management Private Cloud Permission WPA3 Trending IBM History Botnet Time Management Business Owner Browser HIPAA Screen Reader Chromebook Redundancy Websites Managed Service Cloud Spam Theft Computer Repair Cyberattacks VPN Uninterrupted Power Supply Managing Stress User Tips Files Sports Government IT Services Running Cable Superfish Zero-Day Threat Permissions Artificial Intelligence Bitcoin Recovery YouTube 3D Printing Documents Robot Bandwidth Mobile Data Infrastructure Mobile Office Refrigeration Competition Software Statistics Asset Tracking Cleaning PowerPoint Wearable Technology Printing Cookies Public Speaking Data Management Remote Monitoring and Management Unified Communications Virtual Desktop Save Time Migration BDR USB Managed IT Service Identities Passwords Knowledge App Privacy Company Culture Enterprise Content Management Touchscreen Phishing Office Mouse communications Smart Tech Innovation Social Engineering Business Continuity Consultation Wires Apps Current Events Save Money Hosted Solution Best Practices Procurement Data Consulting Typing Administration Environment Hard Drive IT Support IT Consulting Customer Relationship Management Servers Hosted Solutions Server Management Upgrade Regulations Website Processors Public Cloud Electronic Medical Records Cooperation User CCTV Security Virtual Assistant Cryptocurrency Smartphones Virus Google Calendar Phone System Going Green Hard Disk Drive Storage Data Recovery Facebook Document Management Co-managed IT Downtime Vulnerability Unsupported Software Productivity Big Data How To Network Collaboration Fraud Microsoft Office Workplace Tips Healthcare Alert Language Computers Cloud Computing Monitoring Chatbots SaaS Access Control VoIP Meetings Proactive Apple Remote Computing Motion Sickness Network Security Enterprise Resource Planning Tech Support Project Management Downloads Hacking Mobility Favorites Analyitcs Humor Users Cybercrime Error Unified Threat Management Outlook Application Google Docs Dark Web OneNote Encryption Lenovo Piracy Budget Data Warehousing Saving Money Authentication Digital Payment Programming Social Networking Cyber Monday Managed IT Services Cameras Managed IT services 5G Remote Monitoring Test Health Business Management IT Support Tip of the Week Employees Laptop Server Gmail Malware Office 365 Windows 10 Word Hacks Geography How To Multi-Factor Security Small Business Work/Life Balance Administrator Automation Finance Twitter Hacker Miscellaneous Applications LiFi IP Address Managed IT Mobile Security Remote Worker Settings Network Congestion Cache Efficiency Hiring/Firing Social Database Heating/Cooling Sync Software Tips Google Drive Chrome Black Market Data storage Notes Alt Codes PDF Solid State Drive RMM Emoji Marketing Business Intelligence Break Fix Technology Laws Hardware Google Tip of the week Smartphone Avoiding Downtime Tech Term Software as a Service Hard Drives Managed Services Provider Vulnerabilities Holiday Travel Legislation Information Operations Business Growth IT Management Legal Security Cameras Tracking Utility Computing Staffing Operating System Computer Email Information Technology Education Machine Learning Wasting Time BYOD SharePoint GPS Proactive IT Spyware File Sharing Deep Learning Read Only Scary Stories Retail Communication Android Domains IT solutions Employee-Employer Relationship Human Error Remote Workers Networking Training WiFi Cost Management G Suite Web Server Professional Services Star Wars Samsung Money Backups Firefox Modem Staff Point of Sale Gadget iPhone Corporate Profile Firewall Lithium-ion Battery Scam Google Wallet Telephony CIO Financial Hackers Cables ROI Office Tips Virtual Reality Address Gadgets Search Display Instant Messaging Experience Intranet Authorization Distributed Denial of Service Blockchain Business Technology Virtual Private Network Augmented Reality Computer Care Recycling Mobile Electronic Health Records Alerts The Internet of Things Wi-Fi Cortana eWaste Wireless Webcam Dark Data Consumers Assessment Techology Connectivity Quick Tips Cabling End of Support Mobile Device Managment IoT Crowdsourcing Presentation Update Mirgation IT Technicians Network Management Black Friday Data Breach Mobile Device Flexibility WannaCry Net Neutrality Smart Technology Undo Data loss Monitors Disaster Resistance Conferencing Personal Information Router Paperless Office User Error IT Consultant Content Filtering Best Practice Digital Help Desk Hotspot Comparison Automobile Writing Computing Safety Virtualization Upgrades Analytics IT service Compliance Troubleshooting Buisness Backup Backup and Disaster Recovery Development Entrepreneur MSP Physical Security E-Commerce Internet Exlporer Bookmarks Windows Business Computing Relocation Mobile Computing Specifications Notifications Password Microsoft IT Budget Bring Your Own Device Data Security Technology Shortcut Nanotechnology Customer Service Fleet Tracking High-Speed Internet Two-factor Authentication Tablet Risk Management Internet Supercomputer Disaster Recovery Cybersecurity Licensing Windows 10 Wireless Technology Computing Infrastructure Drones Taxes Tech Terms Windows 8 Identity Theft Data Backup Identity Management Mail Merge Productivity Microsoft Excel

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...