Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Chromebook Troubleshooting WiFi Nanotechnology Digital Payment Wires IT Consultant User Hard Drives Refrigeration Outlook Employees Samsung Staff Hardware Botnet Hosted Solution Identity Business Technology Facebook USB Tablet Antivirus Mobile Devices Alerts Operations Humor Monitors Favorites Recycling Work/Life Balance Distributed Denial of Service communications Word Error Bookmarks Proactive IT Quick Tips Tip of the Week Cybersecurity Taxes Unified Threat Management Chatbots Buisness Social Managing Stress Solid State Drive Unsupported Software Notifications Save Money Financial Statistics Artificial Intelligence Cookies Microsoft Office Drones Business Continuity Recovery Identities Security Remote Worker ROI Motherboard Server Management Utility Computing Websites Management Phone System Computer Care PowerPoint Documents Printing Outsourced IT Multi-Factor Security Travel Internet Politics Hard Disk Drive BDR Geography Smartphones 5G Mouse Address Marketing End of Support Mobile Device GPS Data Breach Hosted Solutions Motion Sickness Proactive Storage Apple Blockchain Printer Operating System IT Management Efficiency Android Password Techology Saving Money Money Access Control Fun IT Budget Deep Learning Web Server Machine Learning Migration Compliance Malware Hiring/Firing Big Data Development Entrepreneur IT service IT solutions Smartphone Training Software as a Service Data Backup Mobility Enterprise Resource Planning Net Neutrality WPA3 Staffing Data loss Vulnerabilities Wearable Technology Wi-Fi Office Tips Flexibility Legal Superfish Router Mobile Data Email Hacks Emoji Safety Education Telephone Systems VPN Hard Drive Cost Management Data Security Search Tech Terms Managed Service Provider Virus Running Cable Backup and Disaster Recovery Disaster Network Authentication Social Networking Presentation Holiday Private Cloud Screen Reader Cryptocurrency Save Time Telephony Monitoring Consultation Black Market Computer Saving Time Privacy Domains Internet of Things Analyitcs Business Innovation Personal Information Supercomputer Lenovo Spam Users Crowdsourcing Google Docs Security Cameras SharePoint Managed IT Services YouTube Laptop Processors Data Management Environment Data Recovery Tip of the week Halloween Retail Consumers Cyber Monday Google Infrastructure Technology Tips Test File Sharing Virtualization Data Redundancy Virtual Reality Bandwidth PDF Employer-Employee Relationship Break Fix Connectivity Phishing Upgrade Cloud Mirgation Mobile Office Physical Security Trending MSP Files Computers OneNote Relocation Managed IT Service Cameras Applications Business Growth Automobile History Permissions Gmail Programming VoIP Hacker Update Patch Management The Internet of Things Servers IT Support Productivity Data Warehousing Software IT Services Instant Messaging Mobile Dark Data Backups E-Commerce Bring Your Own Device Knowledge Current Events eWaste Avoiding Downtime Microsoft Mobile Security IP Address Company Culture Electronic Health Records Budget Public Speaking Mobile Device Management Business Owner User Error Browser Disaster Recovery Best Practice Data storage Analytics Law Enforcement Undo Public Cloud Twitter Wireless Identity Theft Information Technology Piracy Meetings Computing How To Windows Google Wallet Finance Alert IT Consulting Read Only 3D Printing Webcam Mobile Device Managment High-Speed Internet WannaCry Managed Services Provider Tracking Point of Sale Collaboration Network Congestion Corporate Profile Downloads Digital Signature Automation Administration Smart Tech Mobile Computing Enterprise Content Management Website Cabling Permission Settings Co-managed IT Networking Robot Dark Web Unified Communications Software Tips Microsoft Excel Server Lithium-ion Battery Remote Monitoring and Management Business Intelligence Risk Management Display Zero-Day Threat Tech Term Social Engineering Time Management Consulting Workplace Tips Tech Support Remote Computing Cooperation Small Business Comparison Paperless Office Information Cybercrime Gadgets Technology Backup Firewall Best Practices Government Licensing Help Desk SaaS Document Management Sports Black Friday Windows 10 Content Filtering Customer Relationship Management Business Management Cleaning Windows 10 Sync Unified Threat Management Theft Intranet Social Media Vendor Management Managed IT services Features Cyberattacks Google Drive Hacking Experience Downtime Bluetooth Bitcoin IBM IT Technicians Electronic Medical Records Firefox Cloud Computing Computing Infrastructure Virtual Private Network Network Security Customer Service G Suite Productivity Managed IT Encryption Two-factor Authentication Cache Procurement Windows 8 App Application Typing Project Management Fraud Regulations Healthcare Miscellaneous Office 365 Asset Tracking Smart Technology Scary Stories RMM Augmented Reality Administrator Heating/Cooling LiFi Managed Service User Tips Human Error Google Maps iPhone Ransomware Maintenance Google Calendar Going Green Employee-Employer Relationship Wireless Technology Computer Repair Communication BYOD Modem CIO Internet Exlporer Fleet Tracking Health IT Support Assessment Cables Network Management Gadget Hackers Business Computing Apps Star Wars Scam IoT Writing Cortana VoIP Specifications How To Passwords Mail Merge Spyware Virtual Desktop Touchscreen HIPAA Remote Monitoring Authorization Chrome Conferencing CCTV Uninterrupted Power Supply Vulnerability Upgrades Digital Disaster Resistance Competition Hotspot Remote Workers Legislation Office Alt Codes Language Shortcut Technology Laws

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...