Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: PowerPoint as a Multi-Purpose Tool

Tip of the Week: PowerPoint as a Multi-Purpose Tool

Microsoft PowerPoint is a well-known solution - well-known enough that the product has become synonymous with the task, regardless of what program one happens to use. Of course, this doesn’t mean that one necessarily must use it to create a presentation to go with a sales pitch. For this week’s tip, we’ll suggest a few other tasks you could complete with the help of a PowerPoint presentation.

Continue reading

Microsoft PowerPoint is Useful, but Not In the Courtroom

b2ap3_thumbnail_powerpoint_no_courts_400.jpgWe all know Microsoft PowerPoint as a great presentation tool which can help you drive information home to the audience. Naturally, this makes it a great medium for use in more than one type of professional environment. It can be used for webinars, lectures, and even the courtrooms; but is a legal trial really a place for a slideshow?

Continue reading

Make Dynamic Infographics with Microsoft PowerPoint

b2ap3_thumbnail_powerpoint_for_infographs_400.jpgNot only can Microsoft PowerPoint make great slideshows, it can also make engaging infographics. The latest trend in marketing is fairly simple: Visual content sells. Images and videos are the most popular way to take advantage of this. Infographics can offer your marketing campaign a combination of text and image, allowing your marketing content to be both engaging and informative.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Automobile Mail Merge Programming Star Wars Office Tips Mouse Managed Services Provider Help Desk Wireless Data Management Collaboration Permissions Windows 10 Tech Support Government SaaS Notifications Applications Cameras IT Consultant Maintenance Mobile Device Management Virtualization IP Address Cryptocurrency Utility Computing Corporate Profile Hosted Solutions Router Social Media Mobile Data G Suite Nanotechnology Sync Politics Data Security Undo Cookies Cybersecurity Cables HIPAA Cooperation Wasting Time Conferencing Procurement Comparison Saving Money Microsoft Excel Best Practices Antivirus Administrator Printer Business Intelligence Digital Payment Database Backups Data loss Telephone Systems File Sharing Money Operating System Big Data Managed IT Service Risk Management Monitors Going Green Financial Black Market Private Cloud Save Time Access Control Documents Remote Monitoring and Management Statistics Remote Worker Consumers Administration Managed IT IT Consulting Tip of the week Shortcut Staffing Remote Workers Instant Messaging Fraud Ransomware Web Server Language IT Technicians Network Security Email Internet Exlporer Regulations Analytics Health Miscellaneous Facebook Black Friday Virtual Reality The Internet of Things Scam Electronic Health Records Specifications Domains Privacy Redundancy OneNote Human Error BDR Firewall Backup and Disaster Recovery Mobile Security Information Technology Machine Learning Modem Buisness Smart Tech Data Recovery High-Speed Internet Gmail YouTube History End of Support Office Google Calendar Alerts User Tips Consultation Downtime Troubleshooting Professional Services Hard Drives Botnet RMM ROI Microsoft Productivity Passwords Hard Disk Drive Intranet Work/Life Balance IoT Cloud Virtual Private Network Google Drive Social Public Cloud Managing Stress Computing Infrastructure Vulnerability Phone System Save Money Project Management Recovery Writing Users User Error Recycling GPS Bandwidth Chromebook Test Proactive Business Continuity IBM Employer-Employee Relationship Typing Browser Geography Fleet Tracking eWaste Identity Theft Cache Enterprise Content Management Physical Security Deep Learning Read Only Information CIO Virtual Assistant Wi-Fi 3D Printing Disaster Recovery Telephony Supercomputer Cybercrime Competition Backup Networking Technology Laws Artificial Intelligence Mobile Computing Tech Term Budget Upgrade Security Cameras Network Management Computer Care Infrastructure Automation Best Practice Gadget Authentication USB Spyware Document Management Features Network Congestion Alt Codes Downloads Halloween WiFi Uninterrupted Power Supply Employee-Employer Relationship Data Warehousing CCTV IT Support Blockchain Staff Digital Signature Communication Word Holiday Digital Retail Distributed Denial of Service Hard Drive Technology Tips Travel Hiring/Firing IT solutions Analyitcs Application Encryption Lenovo Vendor Management Chatbots Tracking Software Quick Tips Google Wallet Identity Notes MSP Co-managed IT VoIP Firefox Innovation Lithium-ion Battery Efficiency Theft Dark Data Employees Business Computing Apple Server Management Voice over Internet Protocol Internet of Things 5G Processors Managed IT services Time Management Public Speaking Alert Gadgets Dark Web Google Maps Avoiding Downtime Migration Current Events Windows 10 Cabling IT Management Paperless Office App LiFi Operations Twitter Smartphone PDF Small Business Disaster Resistance Network Computer Business Cyberattacks Safety Android Outsourced IT SharePoint Law Enforcement Entrepreneur Website Business Technology Refrigeration Managed Service Data Backup Search BYOD Mobility Internet Data Sports Unsupported Software Connectivity Content Filtering WPA3 Running Cable Assessment Managed IT Services Management Workplace Tips Hotspot Zero-Day Threat Unified Threat Management Saving Time Mobile Device Managment Managed Service Provider Business Owner E-Commerce Mobile Device Crowdsourcing Settings Mobile Asset Tracking Licensing Superfish Outlook Cortana Identities Mirgation Personal Information Computer Repair Legislation Knowledge Google Storage Webcam Software as a Service Unified Threat Management Wireless Technology WannaCry Augmented Reality Tip of the Week Authorization Bring Your Own Device Apps Favorites Patch Management Company Culture Piracy Compliance Virtual Desktop Malware Development Social Networking Update Hackers Disaster Spam Touchscreen communications Data storage Password Technology Printing How To Break Fix Relocation Motherboard Social Engineering Two-factor Authentication IT service Computing Wires Consulting Upgrades Virus Data Breach Training Scary Stories Monitoring Marketing Solid State Drive Server Multi-Factor Security Business Growth Meetings Remote Computing Hacker Tech Terms Point of Sale Customer Service IT Budget Software Tips Cloud Computing Hacking Bookmarks iPhone Fun Presentation Tablet Legal Unified Communications Vulnerabilities Business Management Hacks Windows VoIP Phishing Experience Hosted Solution Techology Mobile Office VPN Electronic Medical Records How To Productivity Bitcoin Address Mobile Devices Cleaning Smart Technology Remote Monitoring Heating/Cooling Smartphones Office 365 Flexibility Healthcare Laptop Robot Google Docs Samsung Cost Management Websites Windows 8 User Display Cyber Monday PowerPoint Trending Permission Emoji Customer Relationship Management Computers Chrome Screen Reader Finance Environment Wearable Technology Microsoft Office Motion Sickness Files Taxes Error IT Services Windows 7 Enterprise Resource Planning Education Net Neutrality Hardware Bluetooth Humor Drones Security Proactive IT Servers IT Support

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...