Skip to content
Deep Core Data Logo
  • Home
  • About
    • Careers
    • Case Studies
      • Case Study: Research and Development
      • Case Study: Electronics Manufacturing
      • Case Study: Technical Services
      • Case Study: Financial Advice
    • In the News
    • Testimonials
  • Services & Solutions
    • Managed Services
    • Server Hosting and Maintenance Services
    • Legacy System Adoption
    • Business Process Automation
  • Blog
  • Contact
  • Portal
  • Home
  • About
    • Careers
    • Case Studies
      • Case Study: Research and Development
      • Case Study: Electronics Manufacturing
      • Case Study: Technical Services
      • Case Study: Financial Advice
    • In the News
    • Testimonials
  • Services & Solutions
    • Managed Services
    • Server Hosting and Maintenance Services
    • Legacy System Adoption
    • Business Process Automation
  • Blog
  • Contact
  • Portal

“Do I Have a Legacy System?” and Other Important Questions

How old is the computer in your office? Is it two years old? Ten years old? Is it still running on Windows 95? You may be using a legacy system.

Andrew Sonstrom2018-07-06T13:56:52-04:00July 6th, 2018|Business Practices, Legacy Systems|
Read More

Four Worst Design Decisions; If It’s Not Broke, Don’t Fix It

When a new product comes out, upgrading usually feels like the best decision. But what happens when a product design is so bad, it's nearly unusable?

Andrew Sonstrom2018-06-21T12:48:59-04:00June 21st, 2018|Legacy Systems|
Read More

“Do I Have a Legacy System?” and Other Important Questions

How old is the computer in your office? Is it two years old? Ten years old? Is it still running on Windows 95? You may be using a legacy system.

Andrew Sonstrom2017-09-29T10:35:29-04:00August 24th, 2017|Automation, Business Practices, Legacy Systems, Version Control|
Read More

DDOS, Phishing, and Ransomware: What they are, and how to keep your peace of mind

With the rise of cyberattacks lately, the internet seems like a scary place. Here's what you need to know about ddos, phishing, and ransomware to keep safe.

Andrew Sonstrom2018-07-11T14:41:54-04:00July 13th, 2017|Current Technology, Legacy Systems|
Read More

Introduction to Apache Spark with Examples and Use Cases

Got a lot of data to sort through? This week's guest post from Toptal outlines how Apache Spark can be used to streamline your cluster computing.

Andrew Sonstrom2017-06-01T11:20:51-04:00June 1st, 2017|Database Operations, Guest Blog, Legacy Systems|
Read More

New for the Atari Arcade: Smart House Tycoon

The Revolv may have met an unfortunate end, but could Google's misfortune make way for other Smart House companies? Atari and Sigfox intend to find out.

Andrew Sonstrom2017-01-29T18:06:21-04:00June 23rd, 2016|Current Technology, Legacy Systems, Popular Culture|
Read More

3 Ways YOU Can Improve PC Performance Without Spending a Dime!

Tired of waiting for programs to load? Files opening at a snail's pace? These 3 steps can improve your computer's speed today and let you get back to work.

Rhiannon Chiacchiaro2017-01-29T18:06:22-04:00May 12th, 2016|Current Technology, Legacy Systems, Technical Solutions, Tips and Tricks|
Read More

The Four Leaf Clover of Security Success

You don't need a miracle to keep your computer data safe this St. Patrick's Day if you follow these four simple security tips!

Andrew Sonstrom2017-05-26T08:30:48-04:00March 17th, 2016|Business Practices, Database Operations, Legacy Systems, Tips and Tricks|
Read More

Rack ’em & Stack ’em: Converting Tower Servers to Rackmount Servers

A look at small tower servers, and the process required to convert them to the rackmounted servers found in data centers.

Andrew Sonstrom2017-01-29T18:06:23-04:00October 8th, 2015|Business Practices, Legacy Systems, Technical and Customer Support, Technical Solutions|
Read More

Refinance Your Technical Debt!

Drowning in technical debt? Trust Deep Core Data to get your systems back in order!

Andrew Sonstrom2017-01-29T18:06:25-04:00August 27th, 2015|Legacy Systems|
Read More

Categories

Recent Posts

  • IT Solutions for Weathering a Downturn
  • Why Does Rebooting Fix So Many Problems?
  • 3 Ways to Get a Handle on Pesky Scam Emails at Your Company
  • Why Turning On Number Matching Is Now Urgent
  • Better Authentication Options in 2022

Past Posts

Deep Core Data

180 Elm Street
Suite 05-210
Waltham, MA 02453

Phone: +1 (844) 567-3100

Email: inquiries@deepcoredata.com

  • Recent
  • IT Solutions for Weathering a Downturn
    November 16th, 2022
  • Why Does Rebooting Fix So Many Problems?
    November 2nd, 2022
  • 3 Ways to Get a Handle on Pesky Scam Emails at Your Company
    October 19th, 2022

Subscribe to Our Blog

Join and receive FREE
"Developer's Checklist: Creating World-Class Software"


Quick Links

  • Home
  • About
  • Careers
  • Services and Solutions
  • The DCD Blog
  • Contact Us
  • Managed Services Provider
  • Local Waltham-Area MSP
  • Managed Services
  • The Project Tasks System
  • Touchless IT
  • Testimonials
  • Case Studies
  • Case Study: Financial Advice
  • Case Study: Technical Services
  • Case Study: Electronics Manufacturing
  • Case Study: Research and Development

Services

  • Archaeology Services
  • Data Recycling
  • External IT Auditing
  • Software Deployment

Subscribe to Our Blog

Join and receive FREE
"Developer's Checklist: Creating World-Class Software"


  • Recent
  • IT Solutions for Weathering a Downturn
    November 16th, 2022
  • Why Does Rebooting Fix So Many Problems?
    November 2nd, 2022
  • 3 Ways to Get a Handle on Pesky Scam Emails at Your Company
    October 19th, 2022

Subscribe to the Core Report

Enter your email address to subscribe to our newsletter and receive a new issue each month.


Copyright 2017 Deep Core Data, LLCĀ© | All Rights Reserved | Wildwood SEO
Twitter