fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft SQL Server 2008 Will Soon Reach EOL

Microsoft SQL Server 2008 Will Soon Reach EOL

It is little wonder that, with millions of businesses relying on their secure servers for a variety of computing needs, that Microsoft reigns supreme in profitability. In order to maintain this status, Microsoft must make sure that their software is properly cared for and supported - or retired if these titles are no longer practical to maintain. SQL Server 2008 and SQL Server 2008 R2 are soon due for the chopping block, with an official retirement date of July 9, 2019.

0 Comments
Continue reading

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

0 Comments
Continue reading

Tip of the Week: How to Type Accent Marks and Symbols

Tip of the Week: How to Type Accent Marks and Symbols

When it comes to businesses-to-business relationships, the global impact of the Internet has unlocked quite a few doors. Rather than developing relationships with exclusively businesses in their region, it’s not uncommon for a small manufacturer of model airplanes in Iowa to use the web to find the vendor that can meet all of their needs, even if they’re located in Austria. Doing business internationally means there may be an occasion where you’ll need to communicate in another language. Fortunately, for Windows 10 users, it has never been easier to switch your computer or mobile device’s language.

0 Comments
Continue reading

Tip of the Week: Using Your Computer to Its Full Potential

Tip of the Week: Using Your Computer to Its Full Potential

Your computer, and the many resources you use it to access, are made for utility. As a result, there is an assortment of useful features built into many commonly used systems and solutions. For this week’s tip, we’ll go over some of the shortcuts that you may not have known about.

0 Comments
Continue reading

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

ROI Email Comparison Relocation Machine Learning Law Enforcement Botnet Human Resources Productivity Training Emergency Staff Business Management Content Management Social Media Bring Your Own Device Virtual Assistant Infrastructure Save Money Health Data Backup Wi-Fi Microsoft Saving Money IT Management Computer Fan Managing Stress Operating System Technology Hackers Cabling Education WiFi Current Events Server Hosted Computing Private Cloud Servers Software as a Service Internet of Things Vendor Automation Managed IT Services BYOD IT Services Upgrade Social Engineering Information Employee Ransomware Windows 7 Google Windows Digital Signage Screen Mirroring Website Managed IT Services Computer Network Telephone System Display Cybercrime Database Windows 10 Vulnerability Cybersecurity Cryptocurrency Phishing Entertainment Tip of the Week Chrome Travel Applications Google Drive Telephony Network Security Sports Business Continuity Evernote Internet Hardware Net Neutrality Disaster Recovery Malware VoIP Software Tips Social IT Plan Word Hosted Solutions Business Computing Efficiency Budget Money Cache Tech Term Browser Security Hiring/Firing Mobile Device VPN Smartphones Cast Smart Tech Communications Augmented Reality Paperless Office Data Protection Downtime Identity Theft Cloud Smartphone Remote Worker Communication HIPAA Meetings Collaboration Blockchain Miscellaneous Settings Android Outsourced IT Data Recovery Mobile Devices Computers Software Router eWaste How To Data Storage Scam FCC Mobile Device Management Best Practices Access Control Office 365 Voice over Internet Protocol Avoiding Downtime Backup IT Support Redundancy BDR Windows 10 Encryption Spam Blocking Keyboard OneNote Connectivity Quick Tips Data Office Holiday Employer-Employee Relationship Internet Exlporer Apps Spam Electronic Medical Records Workplace Tips Gadgets Two-factor Authentication Start Menu Data Security Microsoft Office Warranty Public Cloud User Tips Big Data Cloud Computing Specifications Virtualization Update Managed IT Value Google Docs Unsupported Software Innovation Alert Bandwidth Networking Business Artificial Intelligence CES Business Intelligence Remote Monitoring Data Breach Search Engine Small Business Telephone Systems Password Government Privacy Document Management Outlook Facebook Fraud App Managed Service Passwords Users Criminal

Newsletter Sign Up