Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Digital Social Engineering Specifications Data Backup PowerPoint Processors User Virus Upgrades Outsourced IT Halloween Utility Computing Downloads Co-managed IT Instant Messaging Social Networking Compliance Hacker Wireless Technology Office Vulnerability Telephony Internet of Things Computing Infrastructure Knowledge IT Consulting Efficiency Laptop Remote Monitoring and Management End of Support Government Superfish Botnet Nanotechnology Fun Email Automobile IT Budget MSP Hardware Remote Worker Taxes Webcam Permissions Help Desk Security Current Events Avoiding Downtime Internet Exlporer Phishing Private Cloud Unsupported Software Wireless Money Cameras Running Cable Mobility Vendor Management YouTube Net Neutrality Analyitcs Ransomware Cooperation Cables Solid State Drive Server Management Application Authorization Files Administrator Administration Chromebook Black Market Password Identities WannaCry Privacy Identity Theft Mail Merge Buisness Lithium-ion Battery Windows 10 Unified Threat Management Recycling Cloud Computing Management Information Technology Human Error Automation Gadget Spyware Permission Work/Life Balance Outlook Apple Education Development Regulations Cyber Monday Wearable Technology Tip of the week Digital Payment Bluetooth Encryption Microsoft Excel Chrome Twitter Smart Tech Customer Relationship Management Favorites Dark Data Multi-Factor Security Scam Going Green Error IT Management Holiday Motion Sickness Update Chatbots Productivity Corporate Profile Artificial Intelligence Programming IT Consultant Mobile Devices Paperless Office Disaster Smart Technology Undo Healthcare Productivity Information Saving Money User Tips Google Wallet Computer Browser Google Maps Operations Printing Financial Deep Learning Software Tips Intranet The Internet of Things Trending Emoji Managed IT Service Managed Services Provider Cloud CCTV IT Technicians Staffing IT solutions Tech Terms eWaste Business Technology Safety Point of Sale Bring Your Own Device Proactive SaaS Sports Google Docs Backups Test Patch Management RMM Upgrade Employee-Employer Relationship Risk Management Break Fix GPS G Suite Smartphones Wires Features Star Wars Legal Apps Comparison Windows 8 Managing Stress Identity Smartphone Technology Tips History Servers USB Domains Mobile Device Management Remote Workers Google Calendar Piracy Typing IT service IT Support ROI Hard Drives WiFi Migration Law Enforcement Office Tips Hackers Lenovo Analytics Miscellaneous Politics Documents LiFi Touchscreen Printer Access Control Content Filtering Backup and Disaster Recovery Computer Repair Travel Mobile Data Computer Care Google iPhone Settings Network Software as a Service Innovation Mouse Screen Reader IoT Disaster Resistance Operating System Mobile Security Humor Business Intelligence Best Practices Health Hosted Solutions Two-factor Authentication Proactive IT Budget Managed IT services Statistics Heating/Cooling Staff File Sharing How To Hotspot Flexibility Read Only Network Management Windows Hacks Cortana Word Unified Threat Management Quick Tips Small Business Backup Cybersecurity CIO Crowdsourcing Meetings Hiring/Firing Alert Enterprise Content Management IP Address Employees Data storage 5G Network Congestion Company Culture Public Speaking High-Speed Internet Notifications Refrigeration Applications Samsung Connectivity Networking Users Digital Signature Router Tracking Firewall Writing Electronic Health Records Managed IT IT Support Infrastructure Computing Spam Language Managed IT Services Facebook Antivirus Data Gmail Mirgation Bitcoin Managed Service Provider Unified Communications Virtual Reality Document Management Bookmarks Website Websites Mobile Office Legislation Data Management Robot Communication Google Drive Black Friday Cookies IT Services Bandwidth Geography Redundancy How To Fraud Firefox Software Monitoring Remote Monitoring Entrepreneur Saving Time Data Breach Employer-Employee Relationship Social Disaster Recovery Asset Tracking Motherboard Dark Web Phone System Best Practice Mobile Device Competition Microsoft Address Cyberattacks Windows 10 Security Cameras Virtual Private Network Technology Laws Presentation Retail Physical Security Sync Modem Monitors Cost Management BYOD Business Continuity App Cleaning HIPAA Android Wi-Fi Licensing Assessment Fleet Tracking Supercomputer WPA3 Time Management Cache VPN Tech Support Internet Gadgets Virtualization Alerts Save Money communications Big Data Computers Authentication Business Computing Experience Public Cloud Collaboration Uninterrupted Power Supply Blockchain Data Security Training Network Security Tablet Hard Disk Drive Maintenance PDF Telephone Systems Business Owner Business Business Management Marketing Save Time Web Server Augmented Reality Tech Term Workplace Tips Personal Information Theft Distributed Denial of Service Conferencing Vulnerabilities Mobile Computing Electronic Medical Records VoIP Consulting Office 365 Storage Techology Hacking Data loss 3D Printing Data Recovery Consultation Microsoft Office VoIP Shortcut Zero-Day Threat Remote Computing Display Machine Learning Hard Drive Social Media IBM Drones Scary Stories Customer Service Project Management Tip of the Week Virtual Desktop Search Hosted Solution Passwords Cybercrime OneNote Enterprise Resource Planning Server Procurement Technology Alt Codes Recovery Environment Troubleshooting BDR E-Commerce Finance Relocation Cabling Cryptocurrency Malware Mobile Device Managment Consumers Downtime Managed Service Business Growth User Error Mobile SharePoint Data Warehousing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...