Our Latest News

How to donate wisely after a disaster

How to donate wisely after a disaster

As residents across Kentucky, Illinois, Tennessee, Arkansas, and Missouri begin taking stock following the devastating series of tornadoes that hit their states, you might be looking for ways to help the people and communities affected. Unfortunately, scammers also...

Use diagnostics to optimize unified routing for your call center 

Use diagnostics to optimize unified routing for your call center 

When unified routing is running smoothly for your customer service organization, incoming work items are routed to the best agent and the service workload is optimized and efficient. Depending on the needs of your business, the underlying routing infrastructure can...

Apple Releases Security Updates for Multiple Products

Apple Releases Security Updates for Multiple Products

Official websites use .govA .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure...

How to spot, stop, and report post-disaster scams

How to spot, stop, and report post-disaster scams

If you or someone you know has been affected by the devastating series of tornadoes that roared across Kentucky, Illinois, Tennessee, Arkansas, and Missouri, coping with the aftermath is never easy. But when scammers target people just trying to recover, it can be...

Make your donation count by avoiding end-of-year charity scams

Make your donation count by avoiding end-of-year charity scams

The season of giving is here. If you celebrate Christmas, you might be about to fill some stockings. But, for many, holiday giving includes supporting charitable causes. Charities in need of support will be making year-end appeals by phone, mail, email, and social...

Extracting SAP data using OData – Part 5 – Filter and Select

Extracting SAP data using OData – Part 5 – Filter and Select

Before implementing data extraction from SAP systems please always verify your licensing agreement.   Over the last five episodes, we’ve built quite a complex Synapse Pipeline that allows extracting SAP data using OData protocol. Starting from a single activity...

CISA Adds Thirteen Known Exploited Vulnerabilities to Catalog

CISA has added thirteen new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for...

Why is Az 7 an important release for Azure PowerShell?

The Azure PowerShell team is proud to announce a new major version of the Az PowerShell module. Following our release cadence, this is the second breaking change release for 2021. Because this release includes updates related to security and the switch to MS Graph, we...

Recent Comments

    Dr Ware Technology Services

    We look forward to meeting you

    Phone Number: 843 573 0970
    Toll Free: 83DRWARE83 or (833) 792-7383

    Contact Us