­

Cloud Computing Considerations

Cloud Computing Considerations
What should businesses take into consideration when evaluating moving to cloud computing?

There are a number of variables to consider when evaluating a move to the cloud: from migrating data (both to and from a cloud provider), to service level agreements, ongoing management, monitoring, support, and security. Understanding your organization’s requirements and aligning them with […]

Easy external-monitor or projector setup for laptops

Easy external-monitor or projector setup for laptops
If you’re running Windows 7, 8, or 8.1 on a laptop, use this shortcut: Windows key + P.

Tap it with a monitor or projector attached to the laptop’s video output, and you’ll get a new selector box that helps you configure the external display device.

Use Windows 7’s Compatibility mode to run a troublesome older app

Use Windows 7’s Compatibility mode to run a troublesome older app
To activate Compatibility mode, right-click on the affected program’s icon, then click on the Properties item in the menu that pops up. In the Properties window, you will see a set of tabs across the top; choose Compatibility. In the resulting dialog box, you will want to check […]

Clutter vs Junk mail

Clutter vs Junk mail – Office 365
With Office 365, users have been presented with a new feature called Clutter. What is Clutter, and why is it different than the Junk Mail folder? Junk Mail is for email that is suspected to be spam, or has the characteristics of spam. Clutter on the other hand is […]

Microsoft Auto Recover

Microsoft Auto Recover
A very useful feature Microsoft added a few versions back is the AutoRecover feature. This feature is on Excel, Word, and PowerPoint, and is very useful if there is a power outage and you did not save the document.

How does it work?

The Auto Recover feature is turned on by default, and basically […]

Help Desks play key strategic, as well as problem-solving, role

Help Desks play key strategic, as well as problem-solving, role
Ask people to define “Help Desk,” and most will discuss the tactical role of resolving acute problems. But there’s a much more strategic role that a Help Desk can fulfill: Identifying issues within individual companies or with particular products and services that may merit major “repairs” […]

Are You Safe?

Are you safe? Computer Security in Denver
Cybercrime costs U.S. businesses more than $300 BILLION every single year, and the threat is growing every single day. This makes business network security and computer network security more important than ever.

Do you know precisely what to do to stay ahead of the criminals? Do you wonder who you […]

Expect the Best, Prepare for the Worst

Expect the Best, Prepare for the Worst – Protect your Data
As technology dominates more of our business processes, an increasing amount of our valuable data is stored digitally. And, as more of our data exists in the realm of ones and zeroes, it is increasingly critical to have reliable systems in place to ensure that […]

Reset your network password? Update your devices.

Reset your network password?  Update your devices.
Password security is of the utmost importance to your organization’s network and data security.  To keep passwords secure, upon logging in, we are regularly notified that our company’s security policy requires that we create a new password.  After performing this reset, users frequently forget to update the new password […]

Record that Error Message

Record that Error Message
We receive frequent contact at the Help Desk with messages indicating that there has been an error event on an end-user’s PC.  These messages often read similarly to this: “I can’t open Acrobat.  It says there was an error.”  While this is certainly enough information to open an inquiry into the nature […]