Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Nanotechnology, and How Can it Be Used?

What is Nanotechnology, and How Can it Be Used?

Technology is seemingly being made smaller and smaller. Just think about the size of the computers from the mid ‘90s until now. Sure, you can still buy huge a gaming PC with a four-foot tower with liquid cooling, or one that is a fish tank (complete with fake fish); but, the computer you use the most fits in the palm of your hand.

0 Comments
Continue reading

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Hosted Solutions Backup Malware Network Security Microsoft User Tips Mobile Devices Software Data Windows 10 Innovation Internet Smartphones Business Email Browser Hardware Efficiency Tech Term Computer Business Continuity Disaster Recovery Smartphone Productivity VoIP Ransomware Miscellaneous Data Backup IT Services Workplace Tips communications Productivity Android Cybercrime Business Management Cloud Computing Network Alert Office Data Recovery Automation Chrome Outsourced IT Windows Internet of Things Managed IT Services Telephone Systems Communication Save Money Artificial Intelligence Upgrade Server Computers Router Managed IT Services Collaboration Money Law Enforcement Social Media Virtualization Windows 10 Small Business Cybersecurity Quick Tips Facebook Health Holiday Social Engineering How To IT Support Applications Wi-Fi Office 365 Office Tips Passwords Password App Spam Bring Your Own Device Gadgets Gmail Work/Life Balance Operating System Mobile Device Management Settings History Word Remote Computing Information BDR Google Drive Two-factor Authentication Bandwidth Mobile Device HaaS Phishing Hacking Mouse Managed Service Provider Scam Microsoft Office Data Security Entertainment Flexibility Safety Marketing Networking Keyboard Mobility Managed Service Data Protection Apps Encryption Sports Application Connectivity Vulnerability Data Breach Voice over Internet Protocol Recovery Data Management VPN Private Cloud Software as a Service Meetings Redundancy Patch Management Government YouTube Public Cloud USB BYOD Downtime IT Support Data Storage eWaste Avoiding Downtime Human Resources Mobile Computing Training The Internet of Things Robot Servers Physical Security Comparison Internet Exlporer Retail Data storage IT Management Google Docs End of Support Spam Blocking Best Practice DDoS PDF Big Data CES Identity Theft Telephony Infrastructure Social Paperless Office Electronic Medical Records IT Plan Website User Error Budget Remote Monitoring Virtual Assistant Charger Windows 7 Managed IT Content Management Business Intelligence Machine Learning Legal Unsupported Software Wearable Technology Cleaning Black Market Firewall Employer-Employee Relationship Update Telephone System Battery OneNote Botnet Saving Money Blockchain Fraud Hiring/Firing Access Control Cortana Wire Smart Technology Cast Computer Care Accountants Files Education Amazon Administrator Thought Leadership IT solutions Laptop Wireless Network Congestion Travel HIPAA Fax Server NIST Search Rootkit Excel Workforce Audit IBM Tools Recycling Smartwatch Video Games Employer Employee Relationship Netflix Trending Running Cable Shadow IT Unified Threat Management Authentication Streaming Media Google Apps Shortcuts Smart Office Two Factor Authentication webinar WiFi MSP Computing Infrastructure Risk Management Assessment Sync Amazon Web Services Microchip Touchpad Root Cause Analysis IT Consultant Cryptocurrency How to Tip of the week Telecommuting Hybrid Cloud Troubleshooting Computer Fan Supercomputer Lithium-ion battery Criminal Scalability Computer Accessories Remote Work Camera Nanotechnology Television Workers Vendor Document Management Conferencing Environment File Sharing Practices Maintenance Politics Online Shopping Search Engine Addiction Transportation Samsung Staff Safe Mode Apple Vendor Management Windows Server 2008 NarrowBand FENG Value HVAC Instant Messaging Bluetooth HBO Specifications Smart Tech Windows 10s Public Computer Display Monitor Emails Uninterrupted Power Supply Augmented Reality Hosted Computing Internet exploMicrosoft Users Evernote Bing Cache Benefits Data loss Leadership People Programming Biometrics iPhone Content Distributed Denial of Service Wireless Technology Information Technology Books Current Events Customer Relationship Management Enterprise Content Management Relocation Outlook Credit Cards Warranty Virtual Reality Experience Skype Password Manager Security Cameras Reputation Save Time Remote Worker Inventory Advertising Wireless Charging Help Desk Wireless Internet Techology Screen Mirroring Mobile Office Digital Signature Audiobook SaaS Flash Chromecast Going Green Emergency Knowledge Notifications Customer Service Password Management Humor Worker Frequently Asked Questions Millennials Printer Devices Worker Commute Music Solid State Drive Automobile Start Menu Business Mangement Social Networking Hacker Customers Software Tips Multi-Factor Security Tech Support Wiring Shortcut Compliance CrashOverride Managing Stress Regulation Twitter Thank You Congratulations Printers Webinar Company Culture IT solutions
QR-Code