Find us on Google+

Blog

Quick articles that can help you elevate efficiency, lower cost and integrate best practices
May 0
May 0

Got Long File Names?

Path Scan is a small and portable piece of software that enables you to find out the total path length of your files. It is useful when certain operations require a limited path length, as in the case of DVD burning or file synchronizing. Since installation is a prerequisite, you can just drop Path Scan […]

  Read more
Feb 0
Feb 0

How to Enable an Outlook Like Reading Pane in Gmail.

Want Gmail to feel more like Outlook?  Try enabling this handy Google Labs plugin.  It take less than 2 minutes and anyone can execute it.   Step Two  (actually client the word “Preview”) Step Three:  Enable the “Preview Pane” labs plugin radial button and press save changes. Step 4:  Configure your Preview Pane Preference from […]

  Read more
Jan 0
Jan 0

What if your mobile phone is lost or stolen?

You Lost Your Phone. Now What? Don’t know? Keep reading. Here are the basic steps to help ensure a lost phone or tablet isn’t a nightmare. Enable Remote Wipe functionality for your iPhone and Android devices. Remote Wipe will reset your phone to its default settings. The bad news is that anything that is not backed […]

  Read more
Jan 0
Jan 0

Ditch Public WIFI, No One Needs to See Your Stuff!

Ditch Public WIFI   You’re in an airport and you need wifi for your laptop. Ever think to use your phone as your wifi? The newest iPhones and Android phones come with integrated WIFI hot spot technology, meaning you can tether your laptop to your phone’s data connection. You now have a flexible and protected […]

  Read more
Jul 0
Jul 0

Want to prevent a crisis? Document Everything! Part of the Tech Fundamentals Series.

We have all have been in the situation where we are scrambling to find a login, account number or even a phone number to call when some critical technology fails. As a business leader, you have to prioritize the culture of proper documentation. It’s about being consistent and having the tools to document. So, what […]

  Read more
Jul 0
Jul 0

Be Accountable and Delegate As Needed: Part of the Tech Fundamentals Series.

Installment One of our Tech Fundamentals Series. Someone has to own it! And by “it,” we mean technology. By default, ownership usually goes to the office manager. This isn’t wrong, but it is essential that whoever takes on this role knows what is expected of him or her. This person doesn’t need to know how […]

  Read more
Jul 0
Jul 0

Five Reasons You Need to Use Cloud or SaaS Services for Your Business.

There is a lot of pressure for organizations to embrace and adopt to cloud or SaaS services. We here at Rimot Support felt that a first step was explaining why. You need to know your motivation for change, what’s in it for you and at a minimum why it’s better than what you already have. […]

  Read more
Jul 0
Jul 0

Buying a phone? Know you’re really buying a tech ecosystem

It’s rough out there.  So many online reporters, bloggers, news channels, Facebook posters, Twiiter users, Pinterst Pinners, LinkedIn Updaters…  they all are yearning for something relevant and meaningful to talk about. Apple and Google keep giving them what they want. They Fuel the fire! It’s like the Kardashians on steroids.Does it mean anything to the […]

  Read more
Jul 0
Jul 0

6 Things Every Business Needs to Get Right With Their Technology

Ask yourself, how important is your technology? What would be the cost of? Personal and professional downtime? Lost data? The shenanigans that go with tech maintenance or setup? Not having the right tool or information? A 2010 report noted that $26.5 billion dollars was lost to IT failure. You’re not going to prevent IT failure, […]

  Read more
Jul 0
Jul 0

Secure Online Password Storage Explained

1 A client asked us how to best manager their online passwords and other senstive data. Our response is below. Q: Where do you recommend that I keep sensitive information besides in my address book? Right now, I might have Facebook under F with the password, etc. Is there another more secure program for this? […]

  Read more