Blog

Is Uber Sharing Your information?

Is Uber Sharing Your information?

Are you, or is someone you know a driver for Uber? Have you used the rideshare service to get from […]

Read More

Is Your Point Of Sale System Secure?

Is Your Point Of Sale System Secure?

Here’s the hard reality: Even if you devote sufficient resources to get the best security money can buy to protect […]

Read More

Millions of Windows XP Machines are Not Secure, Is Yours?

Millions of Windows XP Machines are Not Secure, Is Yours?

Windows XP was, by any measure, the most successful and ubiquitous operating system of all time. To this day, now […]

Read More

Hackers Are Looking At Your Company For Credit Card Data

Hackers Are Looking At Your Company For Credit Card Data

The numbers are in, and they’re pretty grim. Trustware has released their annual Global Security Report, which outlines the current […]

Read More

Determining Full Time Employee Equivalents (FTE) for ACA 1094 and 1095 reporting purposes

Determining Full Time Employee Equivalents (FTE) for ACA 1094 and 1095 reporting purposes

How to Calculate Full-Time Employee Equivalents (FTE) Total Full-Time Employee Equivalents (EE’s) (30+ hours/week) Total Part-Time EE hours in an […]

Read More

Migrating data from Sage Pro to Sage 300 or ALERE

Migrating data from Sage Pro to Sage 300 or ALERE

Tandem Technologies, LLC has been migrating Sage Pro clients since 2011 and have completed a total of 20+ migrations. We […]

Read More

How to Setup Sage 300 Inventory Control

How to Setup Sage 300 Inventory Control

Below are the requirements that need to be in place before the Sage 300 Inventory Control module can be utilized […]

Read More

Sage 300: 10 Steps to Counting and Reconciling Inventory

Sage 300: 10 Steps to Counting and Reconciling Inventory

Run Day End Processing. Change Costing Method to Day End Processing in IC Options Generate inventory worksheets. Print the inventory […]

Read More