Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

Protecting Shared Computers for Work from Home

8/26/2020

 
Picture
Many families today have a shared home computer to help with day-to-day activities. A teen can search for a job and stream shows. A parent can check work emails, pay household bills, and shop online. A youngster can play an educational game to buy Mom or Dad a few minutes of peace. Yet with COVID-19 sending so many people home to work, the shared computer is getting a lot more use.

Not every employee was lucky enough to get sent home with a business laptop. Some employers ask you to use your own computer. At the same time, you may also be accommodating kids doing online learning, and those little ones still want to go online and point and click to help Elmo plan a birthday party.

But sharing the computer can now present a security risk. You may have important work documents on the home computer. You could log in to the business network unaware of malware downloaded onto your home device, and, of course, that malicious software isn’t doing your home computer any favors either.
With so many people using the computer, make sure to set up virus protection on your home device. Additionally, you may set security patching and software upgrades to happen automatically. One of your young users could be seeing the message requiring an update and ignoring it. That leaves you unaware the software is vulnerable to bugs or threats.

Setting Up Personal Profiles
With everyone sharing the desktop, your work is at risk. You could have downloaded a spreadsheet containing employee personal identification information. That represents a compliance risk if another user inadvertently accesses the document. Or you could lose hours of work. Someone else might drag that project you’ve been working on to the trash with a school assignment rubric.
Our IT experts can set up different account profiles for each user. Doing this not only helps to secure your work from home but can also add protection for your kids.

The immediate appeal is personalizing the desktop for the individual user. Your kids can pick their own home screen backdrops and menu bars. You might not need access to Netflix, but your teen is thrilled to have it right there on the desktop. For smaller children, you can make icons and text bigger. Set up narration to give yourself a break from the umpteenth reading of Goodnight Moon.
For parents, security advantages of the profiles include being able to set up the following:

·        Web filtering enables you to set rules to screen incoming Web pages. This can help avoid children seeing explicit content or accessing a malicious site. You might also limit Web browsing to particular sites.
·        App limitations can ban kids from buying and downloading certain apps or making in-app purchases. For older kids you could require parental permission first.
·        You can set up Screentime limits for particular sites (e.g. Netflix or YouTube) or allow young people to access online content only at certain hours of the day.
·        Age restrictions allow you to filter mature content from search results. These also filter what apps, games, and media the young user can view or buy.
Individual profiles also make it easier for parents to track online activity and computer use. We can even set it up for you to receive reports on Web browsing and application use.
​
Secure your work from home and protect your family of users. Get help setting up the right controls for your home computer needs. Visit us online at www.YellowstoneComputing.com or visit our new store at 219 N Washington St, downtown Thorp. We’re open Monday through Friday from 9am to 5pm.

What We Do

8/26/2020

 
Picture
​Now and then we get a customer who will stroll through the office and they’ll say something like, “do you sell computers” or “where can I find a new mouse”? Questions like this make us aware that some of our customers are still figuring out what Yellowstone Computing offers the community. 

Years ago, when Scott’s Computing was located on Washington Street in Thorp, Joe worked there as a technician, performing the numerous repairs and services that they offered. Around 10 years after moving from Scott’s Computing, we find ourselves back in the same building, but now with our own computing business. It was in 2014 that we decided Joe would quit his full-time job at another business in Thorp to go full time with our computer repair business. Initially operating under the name DeepCore5 Consulting, we eventually renamed our business as Yellowstone Computing, which is fitting not only considering the area’s Yellowstone Trail, but also because of Joe’s love of history. 

Over the intervening years, many of you have visited our old office in our little one-room basement location. However, as our business has grown, we’ve increasingly seen the need for more space, so we are very excited to be in a bigger office. We see God’s hand in leading us back to the same place Joe worked from as a teenager, and now having come full circle as a business owner. 

With hundreds of clients, largely in a 50-mile radius of Thorp, we offer our community a wide range of services and technical equipment. This includes: 
- Desktop and laptop computers, servers, keyboards, monitors, and almost any accessory you need for your home or office.
- Tune Ups, malware removal, hardware and software repair and diagnostics
- Data backup and transfers
- Technical consulting
- Premier business technical consulting, network and IT infrastructure, support and installation 
- Managed service plans
- Project planning and financing options  for business or residential clients

Our customers range from individuals in the community who use their computers at home, to medical offices, municipalities, businesses, and farmers who require dependable technical support. It is our goal that with our new office, and as we add new staff, that we continue provide quality support for any technical need for many years to come.
​
We look forward to seeing you at our grand opening on September 3rd!

New Office Update

8/18/2020

 
Hello everyone! I wanted to take this opportunity to update all of you on where we are at as a company. First, I must apologize for the sporadic articles and lack of consistent updates on social media and our website. We are still in business and plan to be for a very long time. Over the past two months, we have been focused on creating a new store front and office space for our growing company. Essentially, this translates to countless hours of renovation and updates, while continuing to be available to the pressing needs of our customers. It’s been a full summer! Now that we’ve essentially finished with our office preparation we are better equipped to serve you. Indeed, were it not for God’s favor and the blessing of all of you, we would still be in the basement office you’ve come to know so well. 
Now that the major work is complete, we are pleased to welcome you to our new location at 219 N Washington Street in Thorp! (Located between Dairy Bar and Knockout Nutrition.) We now have space for more computer and accessory displays, more inventory, an expanded service desk, and offices. We are also blessed to host office space for Derek and Jeannie of Edwin-Marie Web Developers! Derek and his wife Jeannie work together to create beautiful, functional, high-end websites. We are excited to welcome them to our area. 
When you visit Yellowstone Computing, you may bump into other new but familiar faces as we begin adding employees in the coming months. At the beginning of September we are starting up Coffee & Cookie Thursdays, as well as celebrating an official grand opening that our customers and friends are all invited to join. We look forward to seeing you soon!

Backup Your Apple Computer

8/18/2020

 
Picture
​There are many moments in life when we would like to travel through time. One common instance is when an important document disappears from our computer screen. Making things worse, we forgot to save it! That’s hours of work lost. Fortunately, Apple users have Time Machine’s built-in backup feature for added protection.

This software automatically backs up apps, music, photos, email, documents, and system files. You can backup to
·         external storage devices;
·         another Mac set up as a backup destination;
·         network-attached storage (NAS).

It’s simple. Connect your Mac to an external drive, then Open Time Machine to select your backup destination. You can select when backups happen and what gets backed up, and you’ll also have the option of encrypting your backup, which is a good idea.
Time Machine keeps hourly backups for 24 hours, daily backups for a month, and weekly backups for previous months until full. The oldest backups get deleted when space is needed.
All you need to do to restore your original files is turn on and connect the Time Machine backup disk. Then, you can use the timeline on the Time Machine screen to find the items to restore.
We recommend all Mac users set up Time Machine to backup to at least an external drive, and Apple makes it easy to setup this minimum level of backup. With the local device, you’ll have a first line of defense close at hand if you need to recover or restore your computer.
However, this basic backup does limit your options. To amplify your protection, consider these alternatives.

Gaining More Control of Your Backup
Third-party software offers additional layers of protection. You gain detailed control of what is backed up and when, and what happens afterwards (perhaps you’ll want the software to eject the external device or shut down). You can also find software that backups operating systems and settings too. This could prove useful if your Mac gets stolen or damaged. You’ll be able to move to another device and quickly get all your data and applications configured as they were.
Another alternative for enhanced backup is the cloud. Time Machine and third-party software solutions require a local device to hold the backup. But if your computer is stolen, the thief is likely to have taken your backup too. Or, if your laptop is damaged in a flood or fire, the backup is probably also destroyed.
You’re also at risk of ransomware with Time Machine and third-party software. If malicious software compromises a device (yes, Macs are vulnerable too), it’s going to spread to connected or networked devices. So, the USB backup drive or NAS is as susceptible to encryption as the main Mac device.
Cloud backup provides a solution that helps avoid all these issues. Your backup data is stored in a datacenter that the thief, fire, flood, or ransomware can’t touch. Most cloud backup providers boast rigorous security protocols.

Eventually, all hard drives will fail. Backing up important data to one device leaves you at risk of a single point of failure. Cloud backup removes the fear that the one backup drive isn’t going to be working when you need it. Need help setting up Time Machine, a third-party backup, or configuring your cloud backup? Let our computer experts help! We don’t want anyone to go without the safety and security of a reliable backup. 

Your Webcam Could Be Spying On You

8/18/2020

 
Picture
In the midst of a global lockdown, many of us have been relying on webcams to stay connected. These cameras let us join virtual meetings for work and online hangouts with friends. But bad actors can also use a webcam to spy.
Someone watching through a small laptop or personal computer camera may sound farfetched. And if you don’t make a hat out of tinfoil, aliens will take over your brain, right?
Except, it is true that webcams can be used for spying.
Seeing someone with a piece of tape over their webcam isn’t that unusual. Even Facebook’s founder does it. At conferences now, you might even receive a branded sliding webcam cover as swag.

How Webcam Spying Works
How can someone access your webcam in the first place? Typically, they’ve installed malware. The malicious software allows them to remotely control your computer and view its webcam.
A cybercriminal might access your webcam using spy software, a remote access trojan (RAT). The software spreads through freeware, spam emails, infected attachments, or fake website links.
The software allows the remote user to take control of your computer. They could view your online activity, read messages, or capture screens and keystrokes, and they’ll be able to turn your webcam on to spy on you – without you knowing it.
The webcam light located near the lens will indicate whether camera is currently recording. However, it’s easy to miss and many people don’t understand what the light means.

What to Do About Webcam Spying
Well, there’s that piece of tape, or you might use a Post-It note to cover the camera, but that doesn’t address the bigger issue. Since we’re talking about malware here, the usual rules apply.
  • Don’t trust attachments, even from people you know.
  • Hover over external links to see where they will take you before clicking.
  • Question the credibility of any freeware you might download onto your computer.
  • Install a good antivirus system, especially one that checks emails.
  • Put a good firewall in place to prevent attackers from accessing your computer.
  • Install patches for your operating system, browser, and software to keep security current.
  • Choose a laptop or webcam with a built-in physical shutter. For example, Lenovo devices typically label this as ThinkShutter. 

While we’re talking about webcams, keep in mind your smartphone camera and any surveillance cameras need protection too. On your phone, keep your passcode private and make sure antivirus and security patching is up to date. With a surveillance system, always change the default password – you’d be amazed how many people don’t bother to do so – as that’s just making the hackers job easy for them!
Want to be sure you’re not being spied on? Our IT experts can make sure you have a strong firewall in place to monitor network traffic and block suspicious activity. We can also ensure your antivirus and malware security is top notch.

Tips for Trouble-Free Online Meetings

8/18/2020

 
Picture
Online meetings are the new norm for many, but that doesn’t mean people magically know how to enjoy a trouble-free online conference experience. These tips can power more successful meetings.
Many businesses today are working from home with a reliance on Skype, Microsoft Teams, Google Hangouts, Zoom, or GoToMeeting. But even with these platforms offering voice or video capabilities, there can be tech problems. These tips can minimize the trouble and enhance business collaboration.
 
1. Go Wired
Connecting to Wi-Fi offers flexibility and mobility. Yet when it comes to an online meeting, prefer a wired connection. Enjoy a more reliable meeting connection by plugging your laptop or desktop into the internet router using a network cable.
If you need to use a mobile device and can’t connect via cable, reduce Wi-Fi obstacles. Call in from as a close to the wireless access point as you can. Wi-Fi signals are a form of radio wave, which means they can be hindered by:
·         large metal objects near the router;
·         thick walls;
·         other electronics;
·         Wi-Fi congestion from your neighbors’ access points.
 
So, that important meeting is not the one you join from a cement-bricked basement, not when your Wi-Fi router is in an upstairs bedroom and your neighbors are all relying on Wi-Fi signals, too.
 
2. Prioritize Your Meeting
When you have a scheduled meeting, announce it to the rest of the household. Ask kids not to get on Xbox or stream movies at the same time as you connect to your meeting. See if you can’t persuade your partner, who is also working from home, not to download large files or new software at the same time as your meeting.
Program your devices to back up at times that won’t compete with your work hours. In the office, your IT team scheduled updates or security patches outside of business hours. Now that you’re doing it all at home, be smart about when you do upgrades. Depending on your home internet speed, trying to do too many things at once can cause trouble for everyone.
 
3. Test Connections Before the Meeting
You may feel that all you’re doing is meeting online right now. Why would you need to test audio and video each time? Well, every time you unplug a device such as a microphone or headset the settings will return to the default. That means the next time you connect you aren’t set up the way you want to be. You were expecting to listen in using your USB headphones, but the last time you unplugged them your computer switched back to the next available audio input (e.g. your monitor or built-in laptop speakers). 
 
By checking the connection first, you also make sure you have the most up-to-date platform software. You don’t want to be late to a call because your device has decided it needs to re-install Skype right at that moment.
 
4. Use the Right Equipment
Headsets and external microphones limit the ambient noise, so you’ll hear better. Plus, it will make your contributions easier to hear, too.
Muting your microphone when you’re not talking also helps – it reduces the noise pollution. Problems can arise when your mic picks up other people talking through your speakers. This precaution also saves you from apologizing when your dog barks ferociously at the FedEx delivery person.
 
5. Pick the Best Setting
Plan the best place to take that online meeting. The closer you are to your wireless access point, the better your connection.
Plus, you want to avoid high-traffic areas, as you’re more likely to be distracted. A child or furry colleague could make an unplanned appearance.
Select an area with a simple background, too. Sitting in front of a window may seem like a good idea, but it makes your face darker and more difficult to see on video. Ideally, you want to be in a well-lit room with a plain wall as your background.
 
6. Take Full Advantage of Online Meeting Features
You may have done conference calls in the past. Everyone called in, spoke when necessary, and that was that. But much of the top business collaboration software offers added features:
·         Call recording provides a record that can be checked later.
·         Call transcripts give you an efficient way to capture all that happened in a meeting.
·         Some platforms let you add virtual backgrounds to video calls.
·         You might also enable an interactive shared whiteboard, presentation slides, or co-browsing.
 
Online meetings are efficient and cost-effective. With the current health crisis forcing many of us to adapt to connecting virtually, implementing these ideas can help.

We've Moved!

7/9/2020

 
We have moved to our new location at 219 N Washington St, Thorp! Office hours remain the same, Monday through Friday 9am to 5pm, closed Saturday and Sunday. We hope you stop by and visit soon!

When – And Why – You Need A High-End Workstation Computer

6/8/2020

 
Picture
​Business success will only come if your people have the right tools for the job. And when it
comes to computing hardware, a one-size-fits-all approach will simply not cut it. Just as a
tradesperson needs the specialized tools relevant to their trade, so office workers require the
right computing equipment for their particular roles.
Professionals such as engineers, architects, scientists, developers, data analysts, videographers
and CAD and graphic designers will likely require much more computing power than your
average employee. Here’s why you need to hook them up with a high-end workstation computer.
 
Multitasking Made Possible
Insufficient computing power risks creating bottlenecks in your workflows as your employees are held captive by long processing times. That’s why most high-end workstation computers are
optimized for multitasking. They enable team members to jump from task to task with the
processing power they require to get multiple things done concurrently. That will deliver
dividends to your project timelines, since key workflows are not held up by lagging hardware.
 
Super-Charged Performance Engineering
Most high-end workstation computers undergo rigorous control testing to ensure they can hit the
high-level performance standards you’d expect from a state-of-the-art machine. In the design
phase, expert attention is paid to aspects such as airflow and thermal properties to ensure the
machine is primed for high and stable performance over a long period. Think of it like a race car
versus a standard production car: While a production car is designed and built to get you from A
to B, a race car is designed to ensure it delivers maximum performance from "go" to "whoa."
 
Professional-Grade Graphics
From major construction projects to the latest in product design, visuals play an enormous role
in today’s business environment. If you want the cash to fund your project, you need to wow
investors with a superbly-articulated vision. High-end workstation computers offer the
professional-grade CAD graphics and 3D-rendering capability you need to stand above your
competitors. Leave the tired old slideshow presentations to the amateurs.
 
Scale Up When You Need To
We don’t need to tell you that software is developing at incredible speed, and what’s considered cutting edge today will be old news tomorrow. Here’s where the real return-on-investment value of a high-end workstation computer comes into play. Most can be configured with a greater number of processors – and more powerful processors – than a standard PC. So you can set up
your hardware today to meet the software demands of tomorrow, and ensure you’re well placed to immediately capitalize on new functionality without the need to update your entire PC fleet.
 
Large Project Capability
Large projects require a lot of memory. Hi-res images, video content, 3D renders, virtual tours,
CAD plans and huge volumes of data can all send the size of your project files into the
stratosphere, and the sky is the limit with high-end workstation PCs. Some also come
with error-correcting code memory (ECC memory) that prevents the vast majority of memory
errors that can cause data loss and other workflow holdups.
 
Huge Internal Storage Capacity
High-end workstation computers can be configured with multiple terabytes of internal storage.
That means your people can work on several large projects on one machine. It’s also good news
for confidential or sensitive projects that you may want to isolate to a single workstation that is
not connected to your network or otherwise specially protected from cyber threats. Also keep in mind that workstations with large hard disks are capable of transferring huge volumes of data at much greater speeds than a standard desktop PC.
 
Reliability You Can Count On
While standard desktop PCs are designed to handle general office tasks with relatively low
processing and data-transfer demands, high-end workstation computers are custom engineered to do the heavy lifting while maintaining excellent reliability. They are designed to handle task-specific loads while reducing downtime with sophisticated functionality like remote monitoring, diagnosis and repair. And that means greater productivity and the reliability to ensure far fewer blowouts in your project timelines.
 
Price Versus Performance
When it comes to choosing the right computer systems for your team, don’t base your decision
solely on the initial price tag. While standard desktop PCs are cheaper than high-end
workstation computers, they won’t necessarily deliver a better return on your investment.
Short-changing your specialized employees with insufficient processing, storage and general
computing power could lead to below-par project outcomes. But put the rights tools in the hands of the right people and you’ll likely see a boost in productivity along with a marked improvement in the quality of the work your team is able to produce.

“Have you tried turning it off and on?”

5/20/2020

 
Picture
There’s one solution to tech problems that everyone knows: turning the device off and then back on again. This go-to move is a bit of a joke in the IT industry. Who needs help-desk support if you can find a power switch? Surprisingly, this approach actually does solve a lot of problems. Take the Microsoft Windows Blue Screen, for instance. If you see this screen, Windows cannot continue working. Restarting the computer may be the only fix you need.

Sometimes systems will lock up, or an application will freeze, and you can’t do anything except stare at that annoying little icon indicating the computer is stuck. If it’s an application, you can try “Force Quit” (CTL + ALT + Delete in Windows, or Option, Command, and Esc on a Mac). But if that doesn’t work, you may have to force a shutdown. On a Mac you can do this by pressing Command + Control + Option + Power button. On a PC you can hold down the power button for as long as needed for the computer to shut off.
Don’t worry, modern computers are designed to endure unexpected shutdowns. However, it’s definitely safer to use the power button than to pull the plug from the electrical outlet.
When you have issues with internet or network connectivity, powering off your computer may again be the solution. By turning the computer off, you reset its connections to the router, server, or even ISP. This ensures the appropriate information to get online is being communicated back and forth. That doesn’t work? Try powering off the router or modem. The same explanation applies, only now you’re resetting the connection from the other side. Some modems and routers do not have a power button, in that case you can unplug the power cord, count to 10, and plug it back in.

A Couple of Cautions Before powering off the device, if possible, save documents and close open windows. Unexpectedly turning off a computer may cause data corruption in any files you had open. Make sure that you’re not devastated by a computer freezing up by remembering to save regularly. It is also worth making multiple, incremental copies of your work as you make your way through it. For example, File v1.doc, File v2.doc, etc. You can do this using the “Save As” function.

Keep in mind that when turning something off and on again as a quick fix, you don’t want to go too quickly. Keep the device powered off for 5–10 seconds. This will give it the necessary time to reset.
It is important to note that modems and routers often have a Reset button, this should not be confused with a Power button. The Reset button is usually quite small and recessed to prevent accidental use. The reason for this is because the Reset button will clear all settings and put the device back to a factory state. Doing this to your modem or router will usually terminate your Internet connection and remove any customized settings like wireless network name (SSID), passwords, etc. At that point, you may need to contact your IT company or service provider to get up and running again.

Also, you probably want to avoid turning your computer off and on many times in a day. If you use the device a lot throughout the day, leave it on. If you are taking advantage of a maintenance plan from an IT service provider, they may require you to leave your computer on as well, and they’ll handle any restarts or shutdowns required.

Nevertheless, restarting a computer or any device remains a good way to get it back to the way it was. This time-honored self-service solution isn’t going to do the trick every time, though. Some issues will remain after a reboot, such as a virus infection. Or there could be a hardware issue that needs fixed.
Don’t give up hope. Speak to a professional if powering on and off isn’t the answer. You can be sure an IT expert will have some other ideas to try!

Did you know you can read our articles in print as well? Head on over to sentinelruralnews.com to get early access to our articles and other local content! You'll find us in the Columns section.

Setting Your Scholar Up for Online Learning

5/4/2020

 
Picture
Schools around the world have closed their doors during the COVID-19 crisis, students from kindergarten through graduate school are being asked to learn online. It’s a change for everyone but having the right technology in place can help with the transition.
Your student may have been using the Microsoft Office suite of software at school. If you do not have Microsoft Word, Excel, and PowerPoint at home, check if your school is providing licenses or free software.
If not, buying a subscription to the online Microsoft 365 package allows you to pay monthly or yearly, and it’s much more affordable than in the past. One month is about the cost of two café coffees.
Otherwise, your student may be able to get work done using Google’s suite of tools. Teachers may accept links to Google Docs, Sheets, or Slides. These free options are also useful when your student needs to work on a group project. People can collaborate online in real-time using the G-Suite software.
 
Teleconferencing with Teachers and Peers
Your student is likely to need to download teleconferencing software such as Zoom or Skype. Beware! Cybercriminals take advantage of every opportunity. Noticing the increased demand for these services, they’ve set up bogus sites. Make sure that you are downloading from the legitimate sources: www.skype.com or www.zoom.us.
 
While we’re talking about teleconferencing, you might pass on these best practices:
·        Use headphones to limit audio distractions.
·        Join calls from a low-traffic setting with simple backgrounds.
·        Ask others at home to avoid downloading, streaming, or backing up while the student is live online.
·        Connect to the router with a network cable, or at least be as close to the wireless router as possible during the call.
 
Considering Cybersecurity
In addition to setting up fake teleconferencing sites, cybercriminals have other ways to exploit the situation.
Remind any students learning from home that they need to keep their username and password private. This is a lesson that never gets old.
Are you still using Windows 7 on a home computer? This popular operating system (OS) reached the end of its life in January 2020. Yes, it may still work, but it is no longer receiving security updates from Microsoft, and the bad guys know Windows 7 is vulnerable. Continuing to use this OS puts you at risk. Without new upgrades, you’re no longer protected from vulnerabilities or exploits.
You probably already know to avoid using public wireless networks. Although your students can’t go to a coffee shop or public library right now to get online, reminding students to secure their online activity is critical.
 
This is a good time to review your Wi-Fi setup. Too many homeowners don’t change the default username and password on their routers. Big mistake. You should also:
·        set your network up to encrypt transmissions;
·        update router software regularly.
 
A Focus on Learning
There’s one more thing parents and guardians might consider. At school, the computers prevent students from going to certain sites or downloading files, but you may not have the same blocking and filtering set up on your home devices. This can be addressed in settings.
If you have to share a computer, set up a student-specific user profile to:
·        prevent your student from getting distracted during learning;
·        limit exposure to malware and cyberthreats;
·        avoid them accessing any of your work files.
 
You may feel isolated during the coronavirus quarantine, but you’re not alone. Our tech experts can help you set up and secure your technology for work or school from home.
<<Previous
Forward>>

    Yellowstone Computing

    To read about us, click here!

    Archives

    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.