Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft OneNote May Be the Best Note-Taking Tool on the Market

Microsoft OneNote May Be the Best Note-Taking Tool on the Market

Most modern PCs come pre-installed with a handy tool by Microsoft called OneNote (and it’s also included with Office 365). Today, we’ll run through the features that OneNote offers that make it a useful business tool.

0 Comments
Continue reading

Tip of the Week: How to Automatically Open a Windows App in Fullscreen

Tip of the Week: How to Automatically Open a Windows App in Fullscreen

If you’re a regular user of Windows applications, you’ll notice that they will, by default, open into smaller windows, allowing users to customize the size of their windows as need be. Usually, when you want to increase the size of the app, you have to click the maximize button in the top-right corner. However, you can save a little bit of time each time you do this by setting Windows to default to full-screen mode for this application.

0 Comments
Continue reading

Tip of the Week: Activate These Solutions Now Before You Misplace Your Mobile Device Later

Tip of the Week: Activate These Solutions Now Before You Misplace Your Mobile Device Later

Can’t find your mobile device? If you’ve taken precautions and enabled solutions designed to track the whereabouts of your device, then you’ve got no reason to panic. Of course, hindsight is 20/20, so you’ll want to make sure you activate a phone-finding solution now (while you’ve got your device in your sights).


For an iPhone or Apple Device
If you’re an Apple enthusiast, you can use the Find My iPhone feature to locate any device connected to your Apple account. Log into your iCloud account or download the Find My iPhone app (before you lose your device, of course), which will help you keep track of your devices should you lose them. You can even track where your device is and where it has been. You can even lock the device and send it a message telling whoever finds it how to contact you! 

For an Android Device
Android makes finding your lost device as easy as performing a Google search. If you’re signed into your Google account, and you have your device linked to it, all you have to do is type into the search bar, “Find my Phone.” As long as there’s a device connected to your Google account, you’ll be shown a small map in the search results which shows you where the device is located. You can then proceed to ring the device and find it, if it is turned on and nearby.

For Other Devices
If you lose a more obscure device, you might have a little more trouble locating it. Thanks to a great app called Prey, you can find just about any laptop or smartphone that may be missing. You can install Prey for free on up to three devices, and as long as a thief hasn’t completely wiped your device, you’ll have a decent shot at discovering who has found it. Provided that your device has a Wi-Fi chip, a webcam, and the app installed, Prey can take a picture of whoever has found the device as well as where it is located.

Any devices that have Prey installed on them will automatically issue a report to you every so often, starting at 20 minutes. This can tell you exactly what’s happening with your device. This includes webcam snapshots, desktop captures, program installations, changed files, and so much more. Of course, if you think that maybe someone has just found your device and hasn’t stolen it, you have the option of letting them know how to contact you through various methods. Worst case scenario, you can lock it or remotely wipe it to secure any data located on it.

For more great tips and tricks on how to get the most out of your technology, subscribe to Indevtech’s blog.

0 Comments
Continue reading

3 Talk-to-Text Apps that Get the Job Done

3 Talk-to-Text Apps that Get the Job Done

Mobile platforms have given way to entirely new ways to develop and make use of apps. More business professionals than ever before are relying on their smartphones to get work done while out of the office, but the functionality of the on-screen keyboard interface has some of them stumped on how to stay productive. It’s for this reason that developers have created applications designed to listen to users’ voices, and record them in text format.

0 Comments
Continue reading

Tip of the Week: Use This Chrome Extension to Avoid Online Movie Spoilers

b2ap3_thumbnail_spoiler_alert_400.jpgThe Internet is a great and wondrous thing, giving us information about pretty much anything we could ever hope for. However, this is a dangerous thing for those who want to go about their entertainment “spoiler-free.” In other words, you want to be pleasantly surprised when you watch your favorite movies or TV shows. Sometimes the Internet isn’t so kind toward that goal. Well, here’s a somewhat viable solution: the Spoiler Alert extension for Google Chrome.

Tags:
0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Backup Malware Network Security Microsoft Windows 10 Innovation User Tips Mobile Devices Data Software Internet Smartphones Business Hardware Email Browser Efficiency Tech Term Productivity Business Continuity Computer Smartphone Disaster Recovery VoIP Ransomware Workplace Tips Miscellaneous Data Backup IT Services communications Android Cybercrime Business Management Productivity Network Alert Chrome Cloud Computing Office Outsourced IT Automation Windows Data Recovery Telephone Systems Internet of Things Server Managed IT Services Artificial Intelligence Communication Save Money Computers Managed IT Services Router Upgrade Windows 10 Small Business Quick Tips Money Cybersecurity Law Enforcement Virtualization Facebook Social Media Collaboration Social Engineering Office 365 Spam Health Applications Office Tips Wi-Fi How To Passwords Holiday App Password IT Support Gmail Mobile Device BDR Operating System Two-factor Authentication Information Mobile Device Management Settings History Google Drive Word Work/Life Balance Remote Computing Bandwidth Bring Your Own Device Gadgets Private Cloud Application Vulnerability Recovery HaaS Voice over Internet Protocol Keyboard Hacking Data Breach Managed Service Entertainment Data Protection Marketing Connectivity Flexibility Safety Phishing Mouse Managed Service Provider Encryption Mobility Data Security Sports Apps Data Management VPN Scam Networking Microsoft Office Human Resources YouTube Managed IT Software as a Service Business Intelligence Big Data Unsupported Software Servers Government Electronic Medical Records Update eWaste Saving Money The Internet of Things Public Cloud OneNote Botnet Charger Identity Theft Downtime IT Support CES Internet Exlporer Redundancy Infrastructure Paperless Office Virtual Assistant DDoS Firewall Employer-Employee Relationship Best Practice Physical Security End of Support Data storage BYOD Content Management Hiring/Firing Data Storage Machine Learning User Error Mobile Computing Telephone System PDF Avoiding Downtime Patch Management Fraud Retail Comparison Robot Blockchain USB Spam Blocking Access Control IT Management Google Docs Wearable Technology Cleaning Training Legal Battery Telephony Black Market IT Plan Website Social Windows 7 Remote Monitoring Budget Meetings Cryptocurrency Transportation Samsung Worker Commute Amazon Web Services Customers Vendor Management Outlook Customer Relationship Management Files Education Skype Remote Work Nanotechnology Administrator Bluetooth Criminal Running Cable Shadow IT Public Computer Search Flash Practices Streaming Media Unified Threat Management Laptop Wireless Emails Screen Mirroring Workers Document Management Smartwatch Customer Service Staff Safe Mode MSP Benefits Leadership Online Shopping Addiction Shortcuts Content Video Games Frequently Asked Questions Millennials Books Current Events Computing Infrastructure Solid State Drive Start Menu Shortcut Smart Tech Lithium-ion battery Microchip Software Tips Multi-Factor Security Social Networking HVAC Experience How to Hosted Computing Camera Touchpad Save Time Cast Computer Care Environment Workforce Fax Server NarrowBand File Sharing Hybrid Cloud Travel Evernote IT solutions Cache Vendor Audiobook SaaS Scalability Excel Emergency Knowledge Audit Tools Credit Cards Search Engine Worker Trending Enterprise Content Management Music Apple Automobile Sync Inventory WiFi Password Manager Uninterrupted Power Supply Tip of the week Telecommuting Digital Signature Distributed Denial of Service Wireless Technology Augmented Reality Smart Technology Root Cause Analysis Wireless Charging Wireless Internet People Display Instant Messaging Internet exploMicrosoft Network Congestion Users Computer Fan Devices Bing Monitor Rootkit Password Management iPhone IBM Maintenance Warranty Employer Employee Relationship Netflix Business Mangement Relocation Assessment Windows Server 2008 Accountants Chromecast Remote Worker Two Factor Authentication Information Technology webinar Cortana Wire Mobile Office Security Cameras Risk Management Advertising IT Consultant Virtual Reality FENG Value Amazon Thought Leadership Notifications Help Desk Reputation HBO Specifications HIPAA NIST Troubleshooting Supercomputer Windows 10s Authentication Printer Computer Accessories Techology Recycling Tech Support Politics Humor Television Programming Biometrics Wiring Going Green Conferencing Data loss Google Apps Smart Office Hacker Twitter Webinar CrashOverride Printers IT solutions Thank You Company Culture Compliance Congratulations Managing Stress Regulation
QR-Code