fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Updating the Whole Net Neutrality Situation

Updating the Whole Net Neutrality Situation

Net Neutrality in the United States has been a hot-button issue for almost anyone that uses the Internet. 2018 saw the 2005 principles governing the preservation of an open Internet repealed completely, leaving control over the Internet in the hands of huge companies that deliver Internet services to people. Today, we’ll go back over Net Neutrality and provide an update of what has happened since the Federal Communications Commission repeal of net neutrality laws.

0 Comments
Continue reading

Which Browser is Best for Your Needs?

Which Browser is Best for Your Needs?

There are a variety of web browsers out there, and that variety is much larger than most people think. While most can list off the main ones: Chrome, Safari, Edge, and Firefox, there are many more to consider. However, the real question remains: which one is best for you?

0 Comments
Continue reading

Know Your Tech: Proxy Server

Know Your Tech: Proxy Server

Your server room may be somewhat intimidating to consider. Wires everywhere, mechanical boxes that just sit there, lights blinking intermittently, and the distinct feeling that you probably shouldn’t touch anything - not even a proxy server, whatever that is. However, to help you get to know your tech, the proxy server is exactly what we discuss below!

0 Comments
Continue reading

Technology Addiction is a Very Real, Very Scary Thing

Technology Addiction is a Very Real, Very Scary Thing

Technology has become essential to workplace functionality and personal productivity, but while the long hours spent glued to our tech during the workday are a necessity, the time we spend at home with our personal devices is definitely voluntary. However, more and more people - children especially - are finding it harder to let their devices power down.

0 Comments
Continue reading

Tech Term: Bandwidth

Tech Term: Bandwidth

Here’s a question we want you to take a second to consider...How much do you rely on the Internet? The answer for almost everyone is that it is essential to your current quality of life. Technologies have been developed, industries have been launched, and literally billions of people use it every day, making it one of the predominant inventions in human history. At the heart of this phenomenal technology is bandwidth.

0 Comments
Continue reading

Tech Term: Cookies Defined

Tech Term: Cookies Defined

Chances are, if you’ve spent any amount of time around a computer, you’ve heard of browser cookies. What you may not have heard, is what these cookies do. For today’s Tech Term, we’ll explore what cookies are, and what they do.

0 Comments
Continue reading

Tech Term: Modems and Routers Defined

Tech Term: Modems and Routers Defined

The Internet is an amazing tool, only bolstered by our ability to access it wirelessly - but what do you know about the devices that allow us to access it, namely, modems and routers? Do you know what each does? For today’s tech term, we’ll dive into exactly that.

0 Comments
Continue reading

Net Neutrality Still Needs Your Help!

Net Neutrality Still Needs Your Help!

December 14th is the last day that our government representatives can vote whether or not to continue the Internet’s protection under the net neutrality rules established in 2015. Without these rules in place, your data can be analyzed by your Internet service provider, and they are free to act on that knowledge and manipulate your Internet in support of their own interests.

0 Comments
Continue reading

How the Convenience of The Internet of Things Can Come Back to Bite Us

How the Convenience of The Internet of Things Can Come Back to Bite Us

While the Internet of Things has made many common tasks much easier through automation, it has also increased the potency of particular cybersecurity threats. For an excellent example, one only has to turn to the increasing prevalence of botnets that are powered by IoT technology.

0 Comments
Continue reading

Tip of the Week: Resolve a Poor Internet Connection By Following These 3 Steps

Tip of the Week: Resolve a Poor Internet Connection By Following These 3 Steps

When the Internet goes down in the modern office, chaos ensues. The only way to subdue the panicked masses is to provide answers and to resolve the issue, ASAP. If you happen to find yourself in such an Internet-less predicament, then be sure to follow these three troubleshooting tips.

0 Comments
Continue reading

3 Ways the Internet is Changing Things, for Better AND for Worse

3 Ways the Internet is Changing Things, for Better AND for Worse

We’ve all become so adapted to the conveniences of the Internet that it’s difficult to remember what society was like before it. This becomes especially obvious when watching old movies. How odd is it to see characters do pre-Internet activities like go to the library to research information and use a phone book? These are just some of the ways that the Internet has dramatically changed society, for better and perhaps for worse.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Managed IT Bring Your Own Device Spam Blocking Meetings Servers Keyboard Blockchain Sports Safety Apps Computer Automation Government Unsupported Software Malware Work/Life Balance Business Continuity Android IBM Content Management Outsourced IT Wi-Fi Email Phishing Business Management Money Telephone Systems Private Cloud Cloud Computing Tip of the Week Cleaning Devices OneNote Bing Data Protection Settings Network Security Fraud Managed IT Services Physical Security Criminal Artificial Intelligence Smartphones Bandwidth Tools The Internet of Things Computer Care Mobile Device Management Comparison Two-factor Authentication Office 365 Business Computing Remote Monitoring Windows 7 Ransomware Disaster Recovery Business Virtualization Google Docs Applications Data Vulnerability Flash Cloud CES Password Technology Passwords Data Security Windows 10 Cybersecurity Connectivity Privacy Alert Information Vendor Quick Tips Saving Money Printer IT Plan Cryptocurrency Managed Service Upgrade Networking Flexibility Windows 10 Holiday Encryption Spam Infrastructure Scam Redundancy Data Backup Law Enforcement Display Online Solid State Drive Virtual Assistant Help Desk Browser HVAC IT Services Internet User Tips Software as a Service User Error Marketing Hackers Word Business Mangement Productivity Microsoft Office Smartphone VoIP BYOD Cortana Botnet Safe Mode Network Congestion Data Storage Facebook Miscellaneous Small Business Google Efficiency Network How To Human Resources Security Wireless Internet Machine Learning Microsoft Update USB Credit Cards Operating System Productivity Health Software Inventory Communication Mobile Device Collaboration Patch Management Access Control Internet of Things Hosted Solutions App BDR Gadgets Conferencing IT Support Computers Legal Net Neutrality Hardware Windows Router Augmented Reality Telephone System Wiring Title II Unified Threat Management Mobile Devices Avoiding Downtime Social Media Workplace Tips Server VPN Save Time Google Drive Public Cloud IT Management Paperless Office Password Manager Best Practices Chrome Employer-Employee Relationship Social Engineering IT Consultant Business Technology Innovation Backup Hacker Save Money Telephony Managed IT Services Voice over Internet Protocol Data Breach Tech Term Website Business Intelligence Cybercrime Database Emails Communications Advertising Data Recovery Identity Theft Digital Signage

Newsletter Sign Up