Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

0 Comments
Continue reading

How Technology is Transforming the Way Students Learn

How Technology is Transforming the Way Students Learn

To educate the leaders of tomorrow, using technology from the past isn’t going to cut it. While some schools are still using technology from the last century, others are moving forward. Today, we will take a look at classroom technology innovations, and how to get this exciting new technology in the hands of more students.

0 Comments
Continue reading

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

0 Comments
Continue reading

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

0 Comments
Continue reading

Ancient Greek Computer in Serious Need of Firmware Update

Ancient Greek Computer in Serious Need of Firmware Update

When you picture an old computer, do you see a giant machine that takes up an entire room? These days, people might consider even something like a CRT monitor and a device running Windows XP to be ancient. Yet, the oldest “computer” in the world may actually be a bronze contraption found off the coast of Greece; the Antikythera mechanism, which was used to predict and track astronomical events, like the movement of the planets and occurrence of eclipses.

0 Comments
Continue reading

Tip of the Week: 10 Google Easter Eggs to Get You Through the Workday

b2ap3_thumbnail_google_web_search_400.jpgPerhaps one reason why Google is so popular is because the company knows how to have fun and not take themselves too seriously. One way that Google shows us their silly side is with Easter eggs they’ve incorporated into their search engine. Here’s a list of ten of our favorites.

0 Comments
Continue reading

Is the “Send Me to Heaven” App the Best Technology Prank Ever? [VIDEO]

b2ap3_thumbnail_applications_and_pranks_400.jpgIf someone asked you to throw your expensive smartphone high up into the air and risk dropping it, just for the fun of it, you would probably say no. However, for the hundreds of thousands of smartphone users who have downloaded an app designed to do just that, they may have fallen for one of the best (or dumbest) technology pranks of all time.

0 Comments
Continue reading

Make the Ultimate Commitment to Your Brand With a Tattoo [Video]

b2ap3_thumbnail_is_tattoo_marketing_strategy_400.jpgHow do you feel about your company’s logo? You should be proud of it. After all, it represents your hard work, blood, sweat, and tears. Here’s the ultimate question: are you proud enough of your logo to have it tattooed on your body? Some business people are actually doing this, and their reasoning may surprise you.

0 Comments
Continue reading

Hillary Clinton Learns the Hard Way Why Network Security Best Practices Must Be Followed

b2ap3_thumbnail_hillary_server_snafu_400.jpgWith the United States’ Presidential election ramping up, it’s hard to go anywhere without seeing Hillary Clinton’s face. The former U.S. secretary of state and first lady, Clinton is making her second attempt at the Presidency. She has gained some negative attention recently in regards to emails she had sent from a personal email address when she was the United States’ top diplomat and it’s opened up some questions about data security at the highest reaches of government.

0 Comments
Continue reading

Colonel Sanders Might Be a Technology Genius Thanks to KFC’s Bucket/Printer [VIDEO]

b2ap3_thumbnail_kfc_bucket_tech_400.jpgHuman ingenuity never ceases to amaze us. This whole information technology revolution has pushed access to information to levels that any person that lived before the advent of the computer could never have imagined. What’s more, the establishment of the Internet of Things has made it so humans even have remote access to the goods they own. So when we first saw the technological marvel that KFC had in store for the Canadian chicken consumers, we weren’t so shocked as excited that we’ve reached the next step in humanity’s trek into the future.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hosted Solutions Hackers Malware Backup Microsoft Software Internet Innovation User Tips Network Security Mobile Devices Data Windows 10 Email Smartphones Efficiency Productivity Hardware Business Browser Workplace Tips Tech Term VoIP Disaster Recovery Smartphone IT Services Productivity Computer Business Continuity communications Business Management Android Data Backup Ransomware Miscellaneous Cybercrime Windows Cloud Computing Outsourced IT Office Chrome Automation Data Recovery Server Alert Network Managed IT Services Computers Save Money Router Managed IT Services Internet of Things Upgrade Communication Quick Tips Telephone Systems Windows 10 Artificial Intelligence Cybersecurity Social Media Virtualization Small Business Facebook Money Collaboration Law Enforcement Health IT Support Password Office Tips Passwords How To Mobile Device App Spam Holiday Gadgets Social Engineering Operating System Applications Wi-Fi Office 365 History BDR Remote Computing Private Cloud Encryption Word Work/Life Balance Bandwidth Two-factor Authentication Bring Your Own Device Information Gmail Mobile Device Management Settings Google Drive Entertainment Apps Mouse Managed Service Provider Keyboard Marketing Data Breach Networking Sports HaaS Data Security Data Management Application Hacking Recovery Phishing VPN Meetings Microsoft Office Flexibility Scam Vulnerability Safety Paperless Office Voice over Internet Protocol Managed Service Data Protection Connectivity Mobility Mobile Computing Machine Learning Big Data Redundancy Robot Best Practice Retail Telephone System Electronic Medical Records DDoS Fraud Charger Legal Blockchain Black Market User Error BYOD Battery Access Control Data Storage Save Time Social Avoiding Downtime Firewall Employer-Employee Relationship Wearable Technology Cleaning Comparison Budget Augmented Reality Spam Blocking IT Management Google Docs Government Hiring/Firing Public Cloud Human Resources Cryptocurrency Downtime IT Support Servers Patch Management Telephony Saving Money USB IT Plan Website Windows 7 Remote Monitoring Physical Security YouTube Identity Theft Training Managed IT Data storage CES Business Intelligence End of Support Infrastructure eWaste Unsupported Software PDF Software as a Service Update Virtual Assistant The Internet of Things OneNote Botnet Content Management Internet Exlporer Bluetooth Unified Threat Management Solid State Drive Start Menu Password Manager Environment Smartwatch Software Tips Multi-Factor Security iPhone Inventory Information Technology Wireless Charging Wireless Internet Public Computer Shortcuts Cast Computer Care Relocation Digital Signature Emails NarrowBand MSP Virtual Reality Devices Content Microchip Travel Reputation Maintenance Password Management Benefits Leadership ISP Excel Workforce Advertising Camera Audit Tools Techology Business Mangement Books Current Events Uninterrupted Power Supply Employee Trending File Sharing Sync Going Green Cortana Wire Experience People Vendor WiFi Humor Accountants Distributed Denial of Service Wireless Technology Worker Commute Amazon Thought Leadership Audiobook SaaS Search Engine Root Cause Analysis Customers HIPAA NIST Cryptomining Tip of the week Telecommuting Authentication Worker Computer Fan Programming Biometrics Recycling Emergency Knowledge Digital Signage Files Education Chromecast Laptop Wireless Customer Relationship Management Google Apps Smart Office Music Automobile Mobile Office Display Search Amazon Web Services Notifications Bing Video Games Smart Technology Database Windows Server 2008 Remote Work Nanotechnology Rootkit Warranty FENG Value Criminal Network Congestion Tech Support Google Search HBO Specifications Computing Infrastructure Remote Worker Windows 10s Touchpad Customer Service Workers Document Management IBM Security Cameras How to Practices Employer Employee Relationship Netflix Hybrid Cloud Social Networking Online Shopping Addiction Risk Management Assessment Help Desk Data loss Scalability Shortcut Staff Safe Mode Two Factor Authentication webinar Business Technology Smart Tech Printer HVAC IT Consultant Running Cable Shadow IT Proactive IT Outlook Streaming Media Wiring Skype Fax Server Troubleshooting Supercomputer Hacker Apple IT solutions Hosted Computing Computer Accessories Flash Evernote Cache Politics Television Screen Mirroring Instant Messaging Conferencing Biometric Security Credit Cards Vendor Management Lithium-ion battery Administrator Monitor Enterprise Content Management Transportation Samsung Net Neutrality Frequently Asked Questions Millennials Internet exploMicrosoft Users Thank You CrashOverride Company Culture Congratulations Compliance Webinar Printers Managing Stress Regulation IT solutions Twitter
QR-Code