Here is a list of “on demand” tickets we received in one day. These are examples of tickets which are handled by our tech team as issues arise. This does not included the monitoring and maintenance tickets that are created as we monitor and schedule maintenance for our managed clients.
Technology is an integral part of any business. Coffee shops are using iPads to take orders, paper charts are near extinct in medical and dental offices. The majority of the workforce spends most, if not all, of their day looking at one, to as many as five (or more), monitors depending on the type and […]
As a typical computer user, you don’t give much thought to what a firewall is or what it is used for. A firewall is the network device that protects your private network from the public internet. All internet data, including financial, business, social media, and email, moving to and from your network flows through this […]
8 Reasons Why the Internet was Doomed from the Beginning. To recap our most recent eblast: While campaigning back in the 2000 Election, Al Gore made a comment that he invented the internet. In reality, Al Gore did not invent the internet. The internet evolved from the 60’s Arpanet, then the TCP/IP in the early […]
There are a couple ways to set up AutoArchiving within Outlook. This will move old emails from your main email profile into a different folder within Outlook. That way the archived emails are still accessible to you, however they are not stored on the server. If you check your email through webmail on a website […]
We all know about the internet and we now all know what we do with it. The internet has evolved into much more than just news, shopping, and social media. The “Internet of Things” is a term that describes how embedded devices use the internet to send and transfer media.
Just to recap from a recent eblast, a new client came to us just after being hacked with ransomware. The ransomware virus attacked every single file on the system and encrypted not only the single computer but any other shared drive on the network and the data files for the application the business used were […]