Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Continue reading
0 Comments

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Microsoft Word is more or less synonymous with word processing, but with the right tricks, you can do so much more. For this week’s tip, we’ll go over four neat and useful capabilities that Microsoft Word has.

Continue reading
0 Comments

Tip of the Week: View Multiple Pages at Once in Microsoft Word

b2ap3_thumbnail_microsoft_word_400.jpgLet’s face it; sometimes you need a bird’s eye view of your Microsoft Word document that a single page can’t provide you with. Wouldn’t it be nice if you could view multiple pages and take everything into perspective? Well, as it turns out, you can. In fact, you can view up to eight pages at once by following this simple procedure.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Saving Money Data Warehousing Upgrades Project Management Dark Web Budget Mobility Productivity Cleaning Wireless Technology Firewall Network Security Office Digital Payment Operations Gadget Travel Document Management Tech Terms Save Time Going Green Business Owner Server Management Passwords Electronic Health Records Computer Care Cost Management Mobile Healthcare Data Management Law Enforcement Laptop Financial Entrepreneur Phishing Bitcoin Bookmarks Cabling ROI Identities iPhone Touchscreen Smart Tech Assessment Software Wi-Fi Time Management Wireless Data Breach Google Drive Taxes IT solutions IT Technicians Current Events Techology Data storage Flexibility Cookies Cables Virus Permission Tablet Hard Disk Drive Health Consultation Managed IT Service Procurement Connectivity Competition Computing Wearable Technology Business Management Holiday Education Safety Tracking Theft Gadgets Scary Stories Multi-Factor Security Display Remote Monitoring Update 3D Printing Analyitcs Remote Computing Backups Chromebook IT Budget Typing User Tips Botnet Mobile Office Microsoft Office Staff Retail Cooperation Mobile Device Managment Files HIPAA Social Network Geography Permissions Innovation Bring Your Own Device Password Machine Learning Bluetooth Cybersecurity Avoiding Downtime Work/Life Balance Small Business Windows IT Support Quick Tips Phone System Hacking Cortana IT Services Microsoft Excel Piracy Unified Threat Management Administration Digital Signature Best Practice Point of Sale Authorization Blockchain Private Cloud Hardware Motherboard CCTV Solid State Drive Tip of the week Technology Laws Router Black Friday Scam Favorites Social Engineering Apple Managing Stress Undo Managed Services Provider Risk Management Application Hard Drives Fun User Smartphones Refrigeration Cloud Computing Help Desk Development BDR Experience Smart Technology Recovery Business Growth Google OneNote Buisness Webcam Business Data loss Computing Infrastructure Automation Employee-Employer Relationship Managed Service Provider Artificial Intelligence Security Cameras Lenovo Computer Repair IT Management Unified Threat Management Paperless Office Money Language Employer-Employee Relationship Spam BYOD Software Tips How To Infrastructure Identity Theft YouTube Black Market SharePoint IT Consultant Mobile Data Vulnerabilities Modem Conferencing Productivity Internet Exlporer Vulnerability GPS Corporate Profile Saving Time Information Technology Telephone Systems Twitter Supercomputer Managed IT Services Email Recycling G Suite Network Congestion Management Trending Maintenance Hacker Legal Robot Applications Address Administrator Regulations Utility Computing Networking Google Docs Mobile Devices Server Apps Automobile Mobile Security Alt Codes Smartphone Read Only Statistics E-Commerce Telephony Customer Service Computers WiFi Environment Chatbots Backup IT service SaaS LiFi Comparison Workplace Tips Cyberattacks Authentication VPN Downtime Uninterrupted Power Supply Sync Encryption Processors Samsung Sports Printer Privacy Heating/Cooling Mouse How To Business Continuity Halloween Government Compliance Star Wars Drones Word Facebook Windows 10 File Sharing VoIP IT Support The Internet of Things Virtual Private Network High-Speed Internet Chrome Mobile Computing Human Error Vendor Management Motion Sickness Outsourced IT VoIP Troubleshooting Tip of the Week IT Consulting Microsoft Identity Outlook Virtual Desktop Marketing Enterprise Resource Planning Mirgation Firefox Network Management Hosted Solutions Hacks Collaboration Knowledge Managed IT services Ransomware WPA3 Cache Technology Tips IP Address Redundancy Deep Learning Remote Worker Downloads Fleet Tracking Cameras Windows 10 5G Zero-Day Threat Miscellaneous Remote Workers MSP Staffing Lithium-ion Battery Asset Tracking Internet of Things Augmented Reality Tech Support IoT Digital Google Calendar Data Backup Humor Communication Test Alerts PowerPoint Android Monitoring End of Support Consumers Patch Management Disaster Fraud Finance Hotspot Training Shortcut communications Relocation Windows 8 RMM Public Speaking Tech Term Specifications Superfish Intranet Employees eWaste Cybercrime Settings Distributed Denial of Service Operating System Documents Office Tips Electronic Medical Records Mail Merge Domains Website Wires Google Maps Data Security Instant Messaging Access Control Hard Drive Web Server Servers Legislation WannaCry Hackers Crowdsourcing Enterprise Content Management Net Neutrality Public Cloud Business Technology Mobile Device Management Content Filtering Disaster Recovery Migration Big Data Mobile Device Meetings Notifications Monitors Proactive Efficiency Virtual Reality Gmail Two-factor Authentication PDF Computer Analytics Physical Security Best Practices Error Information Spyware Cryptocurrency Social Networking Virtualization Company Culture User Error Alert Running Cable Security Managed Service Screen Reader Malware Proactive IT Programming Cloud Software as a Service Cyber Monday Browser Upgrade History Writing Users App Technology Bandwidth Data Politics Google Wallet Data Recovery Consulting Business Intelligence Features Hosted Solution Customer Relationship Management Nanotechnology Internet USB Backup and Disaster Recovery Remote Monitoring and Management Disaster Resistance Websites Hiring/Firing Business Computing Save Money CIO Personal Information Search Storage Presentation IBM Unified Communications Emoji Antivirus Social Media Unsupported Software Managed IT Dark Data Office 365 Printing Licensing Break Fix Co-managed IT

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code