fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft SQL Server 2008 Will Soon Reach EOL

Microsoft SQL Server 2008 Will Soon Reach EOL

It is little wonder that, with millions of businesses relying on their secure servers for a variety of computing needs, that Microsoft reigns supreme in profitability. In order to maintain this status, Microsoft must make sure that their software is properly cared for and supported - or retired if these titles are no longer practical to maintain. SQL Server 2008 and SQL Server 2008 R2 are soon due for the chopping block, with an official retirement date of July 9, 2019.

0 Comments
Continue reading

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

0 Comments
Continue reading

Tip of the Week: How to Type Accent Marks and Symbols

Tip of the Week: How to Type Accent Marks and Symbols

When it comes to businesses-to-business relationships, the global impact of the Internet has unlocked quite a few doors. Rather than developing relationships with exclusively businesses in their region, it’s not uncommon for a small manufacturer of model airplanes in Iowa to use the web to find the vendor that can meet all of their needs, even if they’re located in Austria. Doing business internationally means there may be an occasion where you’ll need to communicate in another language. Fortunately, for Windows 10 users, it has never been easier to switch your computer or mobile device’s language.

0 Comments
Continue reading

Tip of the Week: Using Your Computer to Its Full Potential

Tip of the Week: Using Your Computer to Its Full Potential

Your computer, and the many resources you use it to access, are made for utility. As a result, there is an assortment of useful features built into many commonly used systems and solutions. For this week’s tip, we’ll go over some of the shortcuts that you may not have known about.

0 Comments
Continue reading

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Net Neutrality Automation Disaster Recovery Unsupported Software Bring Your Own Device Microsoft Office Outlook Hiring/Firing Cloud Computing Network Security CES Augmented Reality Mobile Devices Telephone System Wireless Charging Money Privacy Staff Help Desk Artificial Intelligence Wi-Fi Data Recovery Safe Mode Proactive IT Communications Chrome Business Mangement Cryptocurrency Smartphone Paperless Office Multi-Factor Security Malware Data Breach Hackers Files Samsung Meetings Ransomware Encryption Tip of the Week Managed IT Services Data Security Avoiding Downtime Inventory Cybercrime Bandwidth Applications Firewall Display Google Relocation Passwords Social Engineering Productivity Spam Blocking Workplace Tips Employer-Employee Relationship Public Cloud Cloud Windows 7 Mobile Device Management Word Gadgets Windows 10 Redundancy Data Backup Unified Threat Management Apple Facebook Office Update Audit Settings Saving Money Collaboration OneNote IT Management Google Search App Sports Holiday Password Telephony Network Software as a Service Tools Leadership Microsoft Managed Service Smartphones Content Management Internet Exlporer Office 365 Innovation Miscellaneous Government Emergency Server Infrastructure Email Google Docs Online Save Money Business Continuity IT Support Private Cloud Entertainment IT Services Software Business Intelligence Remote Monitoring Machine Learning Website Telephone Systems Efficiency Data Management Mobile Device Business Management Fraud Android Millennials Windows 10 Wireless Internet VPN Operating System Access Control Managed IT Business HVAC Cybersecurity Windows Virtual Assistant Virtualization Human Resources VoIP Internet Law Enforcement Computers Vulnerability Blockchain IT Plan Printer Security Cameras Voice over Internet Protocol Screen Mirroring Connectivity Botnet Managed IT Services Outsourced IT Browser Google Drive Wiring Two-factor Authentication Supercomputer Phishing Hybrid Cloud Comparison Small Business Social Media Identity Theft Data Quick Tips Backup Router User Tips Bing Business Technology Computer Data Protection Technology Health Best Practices Upgrade HaaS Vendor Data Storage BDR Hardware How To Internet of Things BYOD Scam Downtime Alert Information Devices Hosted Solutions Tech Term Communication Networking Keyboard Data loss Servers Business Computing Spam Amazon Apps Security HBO Sync

Newsletter Sign Up