Governor Dalrymple has joined leaders around the world in proclaiming November 1, 2012 as Project Management Day for the state of North Dakota. International Project Management day is celebrated... read more
The Microsoft Exchange 2010 environment is ready! ITD will be contacting your agency on migrating from Exchange 2007 to Exchange 2010.
What to Expect
Mailbox moves will be scheduled with each... read more
ITD is extending an invitation to learn about today's critical IT initiatives for free from Gartner Analysts. Join them for an hour and walk away with tactical advice that can impact your top... read more
I just attended a North Dakota SharePoint User Group (SPUG) meeting at the Microsoft campus in Fargo. After an impressive overview of the Windows 8 operating system and the Surface tablet, NEXUS... read more
On Tuesday, October 2, 2012, the Center of Digital Government released the results for 2012 Digital State Survey. North Dakota received a "B" after reviewing submissions from all 50 states.
Under the... read more
Governor Dalrymple has issued a Proclamation of Cyber Security Awareness Month in North Dakota. The October event is an opportunity to engage state and local government agencies, as well as the... read more
During the first week of October, organizations around the world observe Customer Service Week to celebrate the efforts of customer service. Governor Dalrymple has issued a Proclamation of Customer... read more
“The Information Technology Department (ITD) is Preparing for the Future by driving business needs to maintain existing technology, as well as to innovate and create new ways of doing things with the... read more
ITD cordially invites you to attend ITCND "Grab a Byte" Networking Luncheons being held during the month of September. These networking events are FREE, and Non-ITCND members are welcome to attend.... read more
A personal firewall (sometimes called a desktop firewall) is a software application to protect a single Internet-connected computer from intruders. A personal firewall works in the background at the device layer to protect the integrity of the system from malicious computer code by controlling Internet connections to-and-from the user's computer.