Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Mouse Can Do More Than You Think

Your Mouse Can Do More Than You Think

You’ve used a mouse for years, but do you know of all the neat little tricks that it’s capable of? We’ll show you just how much you can get done with your mouse.

Continue reading
0 Comments

Tip of the Week: How to Change Your Mouse Pointer in Windows 10

b2ap3_thumbnail_mouse_pointers_400.jpgThe mouse is a critical part of navigating your workstation. Without it, you’d struggle to open applications, move around Office documents, create images, and countless other functions. Just like many other features in Windows 10, you can customize how your mouse pointer looks and functions, making it much easier to maneuver around your system.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Connectivity Solid State Drive Innovation IT Consultant Help Desk Internet Hackers Trending Customer Relationship Management Enterprise Resource Planning Consumers Cloud Printer Break Fix Cables Google Calendar Collaboration Microsoft Office Vendor Management IT Support Phishing Files Malware Regulations Firefox Consultation Infrastructure Password Computer Repair IT Technicians Mobile Network Management GPS Chromebook Mobile Data Software Downloads Windows 8 Outlook Software Tips Managed Service Two-factor Authentication PowerPoint Word Virtual Reality Quick Tips Recovery Private Cloud Redundancy Data Backup Computer Cyberattacks Miscellaneous Authentication Alt Codes Mobile Computing LiFi Chatbots Staffing Paperless Office Holiday Social Engineering Refrigeration Point of Sale Read Only Hardware Data Breach IBM Typing OneNote Browser Webcam Sports Saving Money Apps Robot Mobile Devices Managed IT Remote Worker Vulnerabilities PDF Migration Star Wars Office G Suite Information Technology Safety User Tips Licensing Shortcut Best Practice Search Managed IT Service Bandwidth Physical Security Wearable Technology Gmail Enterprise Content Management Backup and Disaster Recovery Phone System Cryptocurrency User Error Remote Monitoring and Management Digital Payment Travel Bring Your Own Device Business Intelligence Comparison Administration Google Maps Experience Undo Saving Time Office 365 Data loss Staff Managed Services Provider Automation Legislation High-Speed Internet Apple History Google Wallet Technology Tips Backups Nanotechnology Computing Screen Reader YouTube Permissions Computer Care Business Computing Troubleshooting Managed Service Provider Electronic Medical Records IP Address Website communications Techology Best Practices How To Consulting Mobile Security Windows 10 Geography Windows Botnet Digital Unified Threat Management Wireless Technology Zero-Day Threat Scary Stories Remote Computing Programming Cyber Monday Productivity HIPAA Google Docs Flexibility 3D Printing Features Customer Service SaaS Management Virus Server Facebook Notifications Smart Technology Test Business Continuity Development Fleet Tracking Employer-Employee Relationship Motion Sickness Monitors Relocation Writing Software as a Service Vulnerability Authorization Cookies Business Technology Servers Blockchain Operations Applications VoIP Alert VPN CCTV Tablet Administrator Government Virtualization Healthcare Multi-Factor Security Operating System IT service Machine Learning IT Support Asset Tracking Router Spam Retail Project Management Access Control Security Health Business Unified Threat Management Wireless Knowledge Identity Hacks Superfish Upgrade Information Microsoft Excel Company Culture Cortana Communication File Sharing Alerts Document Management Intranet Outsourced IT Big Data Wires Presentation Save Time Assessment Disaster Email Cybersecurity Touchscreen Hiring/Firing 5G Address Mobile Device Running Cable Passwords How To Application Training Processors Utility Computing Storage Mobile Device Management Wi-Fi Network Congestion Theft Data Warehousing Work/Life Balance Data storage Data Recovery Patch Management WiFi Emoji Hard Disk Drive Electronic Health Records Halloween Motherboard Gadget Mobile Office Display Automobile Smart Tech Procurement IT Budget ROI Disaster Resistance Heating/Cooling Chrome Language USB Bitcoin Finance Virtual Desktop Remote Monitoring Identities Artificial Intelligence Money Compliance WannaCry Smartphones eWaste Co-managed IT Hacker IT solutions Lithium-ion Battery Settings Black Friday Data Environment Humor Firewall Encryption Meetings Tech Term Mouse Antivirus Analytics Law Enforcement Drones Distributed Denial of Service Google Samsung CIO Computers Black Market Content Filtering The Internet of Things Risk Management Statistics Cloud Computing Time Management Digital Signature Mirgation Corporate Profile Documents Printing Disaster Recovery Dark Web Taxes BYOD Managing Stress Social Media Domains Recycling IoT Piracy Unsupported Software RMM Legal Specifications Human Error Instant Messaging Efficiency Augmented Reality Smartphone Hacking Remote Workers Save Money Twitter Windows 10 Mail Merge Cost Management Competition Internet Exlporer Deep Learning End of Support User Social Networking Microsoft Spyware Lenovo Uninterrupted Power Supply Business Growth Hard Drives IT Management Avoiding Downtime Bluetooth Tech Support Proactive IT Data Management Analyitcs Maintenance Google Drive Business Owner Permission SharePoint Cleaning E-Commerce Small Business Telephony Cooperation Cybercrime Fraud Cameras Public Cloud VoIP Laptop Network Security Android Education Hosted Solution Tech Terms Social Gadgets Tip of the week Workplace Tips Backup Hotspot Technology Laws Bookmarks Websites Networking Unified Communications Upgrades Buisness Virtual Private Network Proactive Public Speaking Current Events WPA3 Hosted Solutions Security Cameras Net Neutrality IT Consulting Office Tips MSP Employee-Employer Relationship Computing Infrastructure Modem Cache Technology Scam Monitoring Update Sync Data Security Downtime Managed IT Services Telephone Systems Fun Marketing IT Services Conferencing Entrepreneur Personal Information Ransomware Cabling Business Management Favorites Tip of the Week App Internet of Things Employees Hard Drive Managed IT services Crowdsourcing Network Financial Going Green Users Dark Data iPhone Politics Mobility Mobile Device Managment Tracking Productivity Identity Theft Error Budget Supercomputer Server Management BDR Web Server Privacy

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code