TCS Data-bits
August 2016   
    In this issue. . .
- Plug in to success—7 steps for a strategic technology lifecycle
- How to Stay Safe When File Sharing Online
- 4 ways to be more proficient in Word 2016
- 10 dos and don'ts of presenting with PowerPoint
- Intern Corner
         
 

Let TCS Help You With Your IT Needs

Phishing Attack


Melanie Llanos

At TCS, our interns work alongside industry professionals to learn the ins and outs of network administration and client support. Learn more about Melanie and our third intern spotlight!

What is your dream job?
My dream job is to work for Cisco as a Technical Manager in a Data Center technology team and being able to travel to other sites providing trainings.

Read more

Plug in to success—7 steps for a strategic technology lifecycle
used with permission from Microsoft Office Blogs

Take a minute to think about the applications you use, the programs you depend on and the technologies you've integrated into your business. Now ask yourself these questions: If a specific application supported my company in the past, how is it benefiting me now? Are our programs performing in line with our desired standard? What, if anything, am I doing to ensure my technology is not outdated? Is my vendor providing me with resources to manage my applications? Am I really getting the maximum business value from these solutions?

Read more

How to Stay Safe When File Sharing Online
used with permission from Norton by Symantec
by Nadia Kovacs


File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to various online threats including identity theft, infection or attack.

Read more

4 ways to be more proficient in Word 2016
used with permission from Microsoft US Small and Midsize Business Blog

#1 Co-author in real time with your team

When you and your team members want to collaborate on a document, forget the pain of emailing it back and forth. Forget worrying about what version you're working on. You can now use real-time co-authoring to see everyone's changes as they happen.

Read more

10 dos and don'ts of presenting with PowerPoint
used with permission from Microsoft US Small and Midsize Business Blog

PowerPoint can be both provocative and persuasive in a business meeting.

And precisely the opposite can occur.

"It can be the very best friend you have," says Cherie Kerr, a Santa Ana, Calif., public relations consultant. "But you have to use it right."

Read more

168 Thatcher Rd.    |   Greensboro, NC  27409   |    336-632-0860   |   tcsusa.com

Symantec - Microsoft - Sonicwall - VMWare