Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

0 Comments
Continue reading

How Technology is Transforming the Way Students Learn

How Technology is Transforming the Way Students Learn

To educate the leaders of tomorrow, using technology from the past isn’t going to cut it. While some schools are still using technology from the last century, others are moving forward. Today, we will take a look at classroom technology innovations, and how to get this exciting new technology in the hands of more students.

0 Comments
Continue reading

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

0 Comments
Continue reading

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

0 Comments
Continue reading

Ancient Greek Computer in Serious Need of Firmware Update

Ancient Greek Computer in Serious Need of Firmware Update

When you picture an old computer, do you see a giant machine that takes up an entire room? These days, people might consider even something like a CRT monitor and a device running Windows XP to be ancient. Yet, the oldest “computer” in the world may actually be a bronze contraption found off the coast of Greece; the Antikythera mechanism, which was used to predict and track astronomical events, like the movement of the planets and occurrence of eclipses.

0 Comments
Continue reading

Tip of the Week: 10 Google Easter Eggs to Get You Through the Workday

b2ap3_thumbnail_google_web_search_400.jpgPerhaps one reason why Google is so popular is because the company knows how to have fun and not take themselves too seriously. One way that Google shows us their silly side is with Easter eggs they’ve incorporated into their search engine. Here’s a list of ten of our favorites.

0 Comments
Continue reading

Is the “Send Me to Heaven” App the Best Technology Prank Ever? [VIDEO]

b2ap3_thumbnail_applications_and_pranks_400.jpgIf someone asked you to throw your expensive smartphone high up into the air and risk dropping it, just for the fun of it, you would probably say no. However, for the hundreds of thousands of smartphone users who have downloaded an app designed to do just that, they may have fallen for one of the best (or dumbest) technology pranks of all time.

0 Comments
Continue reading

Make the Ultimate Commitment to Your Brand With a Tattoo [Video]

b2ap3_thumbnail_is_tattoo_marketing_strategy_400.jpgHow do you feel about your company’s logo? You should be proud of it. After all, it represents your hard work, blood, sweat, and tears. Here’s the ultimate question: are you proud enough of your logo to have it tattooed on your body? Some business people are actually doing this, and their reasoning may surprise you.

0 Comments
Continue reading

Hillary Clinton Learns the Hard Way Why Network Security Best Practices Must Be Followed

b2ap3_thumbnail_hillary_server_snafu_400.jpgWith the United States’ Presidential election ramping up, it’s hard to go anywhere without seeing Hillary Clinton’s face. The former U.S. secretary of state and first lady, Clinton is making her second attempt at the Presidency. She has gained some negative attention recently in regards to emails she had sent from a personal email address when she was the United States’ top diplomat and it’s opened up some questions about data security at the highest reaches of government.

0 Comments
Continue reading

Colonel Sanders Might Be a Technology Genius Thanks to KFC’s Bucket/Printer [VIDEO]

b2ap3_thumbnail_kfc_bucket_tech_400.jpgHuman ingenuity never ceases to amaze us. This whole information technology revolution has pushed access to information to levels that any person that lived before the advent of the computer could never have imagined. What’s more, the establishment of the Internet of Things has made it so humans even have remote access to the goods they own. So when we first saw the technological marvel that KFC had in store for the Canadian chicken consumers, we weren’t so shocked as excited that we’ve reached the next step in humanity’s trek into the future.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Backup Malware Network Security Microsoft Windows 10 Innovation User Tips Mobile Devices Data Software Internet Smartphones Business Hardware Email Browser Efficiency Tech Term Productivity Business Continuity Computer Smartphone Disaster Recovery VoIP Ransomware Workplace Tips Miscellaneous Data Backup IT Services communications Android Cybercrime Business Management Productivity Network Data Recovery Chrome Alert Cloud Computing Office Automation Windows Outsourced IT Telephone Systems Computers Router Managed IT Services Server Internet of Things Communication Artificial Intelligence Save Money Upgrade Managed IT Services Quick Tips Cybersecurity Money Law Enforcement Virtualization Windows 10 Social Media Facebook Small Business Collaboration Social Engineering Spam How To Health Office Tips Passwords Holiday Applications App Wi-Fi Password IT Support Office 365 Gmail BDR Two-factor Authentication Operating System Mobile Device Management Mobile Device Settings Word History Work/Life Balance Remote Computing Google Drive Bandwidth Information Bring Your Own Device Gadgets Recovery Managed Service Keyboard Private Cloud Data Protection HaaS Connectivity Data Security Data Breach Entertainment Hacking Marketing Phishing Mouse Managed Service Provider Flexibility Sports Safety Encryption Voice over Internet Protocol Vulnerability Microsoft Office Mobility Networking Data Management Scam VPN Apps Application YouTube CES Black Market Identity Theft Big Data Battery Infrastructure Paperless Office Electronic Medical Records BYOD Data Storage Saving Money Virtual Assistant Charger eWaste The Internet of Things Content Management Avoiding Downtime Internet Exlporer Machine Learning Comparison Government Public Cloud Firewall Employer-Employee Relationship IT Management Google Docs Telephone System Spam Blocking DDoS Blockchain Downtime IT Support Best Practice Fraud Hiring/Firing Access Control IT Plan Website Mobile Computing Physical Security Telephony User Error Robot Data storage Windows 7 Retail End of Support Patch Management Remote Monitoring Business Intelligence USB Managed IT Wearable Technology Cleaning PDF Unsupported Software Update Human Resources Training Servers Software as a Service OneNote Botnet Social Budget Legal Redundancy Meetings MSP HVAC Techology Bluetooth Excel Workforce Shortcuts Smart Tech Travel Running Cable Shadow IT Going Green Emails Trending Microchip Hosted Computing Humor Public Computer Audit Tools Benefits Worker Commute Leadership WiFi Customer Service Camera Streaming Media Customers Content Sync Evernote Cache File Sharing Enterprise Content Management Tip of the week Telecommuting Shortcut Vendor Credit Cards Files Books Education Current Events Root Cause Analysis Social Networking Password Manager Laptop Wireless Save Time Search Engine Lithium-ion battery Inventory Experience Search Computer Fan Fax Server Digital Signature Audiobook Video Games SaaS IT solutions Environment Wireless Charging Wireless Internet Augmented Reality NarrowBand Password Management Worker Windows Server 2008 Display Devices Emergency Computing Infrastructure Knowledge Business Mangement Touchpad HBO Specifications Bing Music How to Automobile FENG Value Uninterrupted Power Supply Cortana Wire Hybrid Cloud Smart Technology Warranty Accountants Scalability Windows 10s Remote Worker Distributed Denial of Service Wireless Technology HIPAA NIST Rootkit Security Cameras People Amazon Thought Leadership Network Congestion Data loss Recycling Employer Employee Relationship Netflix Outlook Maintenance Help Desk Authentication Apple IBM Google Apps Smart Office Two Factor Authentication webinar Printer Risk Management Instant Messaging Assessment Skype Wiring Chromecast Cryptocurrency Monitor Flash Hacker Mobile Office Amazon Web Services Internet exploMicrosoft Users IT Consultant Screen Mirroring Criminal Computer Accessories Frequently Asked Questions Millennials Notifications Remote Work Nanotechnology iPhone Troubleshooting Supercomputer Tech Support Workers Document Management Information Technology Conferencing Software Tips Multi-Factor Security Programming Biometrics Administrator Practices Relocation Politics Television Solid State Drive Start Menu Cast Computer Care Customer Relationship Management Unified Threat Management Staff Safe Mode Reputation Vendor Management Smartwatch Online Shopping Addiction Advertising Transportation Virtual Reality Samsung CrashOverride Webinar Printers Company Culture IT solutions Compliance Thank You Managing Stress Regulation Congratulations Twitter
QR-Code