Tech Spring Cleaning 20192020-07-24T20:24:07+00:00

Tech Spring Cleaning 2019

Out with the old. Preview the new.

Happiness is cleaning the junk out of your server room and knowing you’re up-to-date on the latest software. At Tech Spring Cleaning, you’ll get both plus a tasty lunch and a chance to win a new laptop. Join your friends at Red Level and C/D/H for our annual Tech Spring Cleaning event.

Bring us your old servers, hard drives, and computers for safe and secure recycling. Make sure you’re up-to-date as several key technologies (SQL Server 2008, Windows Server 2008, Windows 7) hit end-of-life.

April 10th

Grand Rapids

West Michigan Works

215 Straight Ave NW
Grand Rapids, MI 49504

Wednesday, April 10th
11am – 1pm

April 11th

Metro Detroit

Red Level Tech Center

40200 Grand River
Novi, Michigan 48375

Thursday, April 11th
11am – 2pm

RSVP for the Tech Spring Cleaning 2019

Clear out the clutter in your server room and learn about new business-grade technologies that will spring your team forward at Red Level’s annual Tech Spring Cleaning event.

Tech Spring Cleaning Collage

Honors and Awards

We’re committed to doing our very best for every client, every day. But you don’t have to take our word for it. Red Level is fortunate to be honored by major publications, suppliers, and community organizations:

RCP 200 Top US Microsoft Partner Logo

RCP Top 200 Microsoft Partner &
3-Time Microsoft Partner of the Year

Inc5000 Logo

6-Time Inc 5000 of America’s Fastest Growing Companies

Crain's Cool Places to Work 2017

Crain’s Cool Places to Work and
Metro Detroit’s 101 Best & Brightest

CRN Tech Elite 250 logo

CRN Tech Elite 250, CRN MSP 500
and CRN Pioneer 250

The latest news from Red Level

  • security

Cyber Security : Be Prepared and Prevent Disaster

The threat landscape is becoming more incessant, dangerous, and high stakes for businesses. The sheer quantity of attacks has been increasing at an alarming rate. The complexity and ingenuity of these attacks are frightening.   Almost all these attacks are identity-based; they start as phishing emails or password spray attacks. Once they gain access to a user account in your environment, [...]