by david | Aug 1, 2019 | IT Blueprint, Life Style, Privacy, Security, Technology
NC not among nine states that have recently passed stricter data privacy and notification laws. Data security has been in the news, with several high profile breaches affecting the private data of millions of people. Without tighter data privacy and notification...
by Dan Siebert | Apr 28, 2019 | IT Blueprint, Security, Technology
Remote Support Name Email Address Enter best contact number Enter problem description. 8 + 15 = Start session After submitting your request we will contact you. Please wait for us to call or send you a code, then enter it below. Enter your six-digit code, then click...
by david | Mar 4, 2019 | Anthropology, Life Style, Technology
Approach Bike lanes are tech friendly Bike lanes don’t sound as tech friendly as they are. They are needed to keep and extend Greensboro’s tech friendly infrastructure. Bike lanes make people happier technology users. Bikes are some of the friendliest technology of...
by david | Aug 18, 2018 | Clouds, Desktop Apps, IT Blueprint, MSO 365, Privacy, Security, Technology, Training
How to move your email safely securely for free, to a new provider. This article explains how to move your your email to a new host (provider). We begin by describing the situation and then discuss the four steps to migration. Lastly, we conclude by summarizing the...
by david | Jun 19, 2018 | Clouds, Desktop Apps, IT Blueprint, Technology, Training
Watch IT Assess IT Update IT Secure IT Is the model Tekmar Solution, Inc. uses as managed service provider. The four step process helps blending the best technologies for users, customers and the entire global computing environment. Our models stay steady for the...
by Dan Siebert | May 9, 2017 | Clouds, MSO 365, Technology, Training
Another Great One Drive feature has been updated. The Vision office 365 from its earliest days was a consistently growing and adapting set of forms that helped users stay in front of demands. The vision is pretty true. The great feature of cc’ing a user when a...