Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hackers Hosted Solutions Malware Backup Network Security Mobile Devices Microsoft Software Internet Innovation User Tips Data Windows 10 Productivity Email Smartphones Efficiency Hardware Business Browser Workplace Tips Tech Term VoIP Computer communications Business Continuity Disaster Recovery Smartphone IT Services Productivity Miscellaneous Business Management Android Data Backup Ransomware Cybercrime Windows Cloud Computing Network Outsourced IT Office Chrome Automation Server Data Recovery Alert Windows 10 Managed IT Services Computers Managed IT Services Save Money Router Internet of Things Upgrade Quick Tips Communication Telephone Systems Artificial Intelligence IT Support Social Media Virtualization Cybersecurity Small Business Money Facebook Law Enforcement Collaboration Health Password Office 365 Office Tips Passwords Mobile Device App How To Spam Holiday Gadgets Applications Social Engineering Wi-Fi Operating System Google Drive Mobile Device Management Settings History BDR Remote Computing Information Private Cloud Encryption Word Bandwidth Two-factor Authentication Bring Your Own Device Gmail Work/Life Balance Voice over Internet Protocol Mobility Scam Vulnerability Microsoft Office Apps Mouse Managed Service Provider Entertainment Marketing Keyboard Networking HaaS Sports Managed Service Data Breach Paperless Office Data Security Hacking Application Data Protection Data Management Recovery Connectivity VPN Phishing Meetings Flexibility Safety eWaste Business Intelligence Managed IT PDF Training Unsupported Software The Internet of Things Internet Exlporer Update OneNote Botnet Mobile Computing Legal Retail DDoS Robot Human Resources Cryptocurrency Best Practice Big Data Redundancy Battery Servers Black Market User Error Electronic Medical Records Charger BYOD Identity Theft Social CES Augmented Reality Data Storage Wearable Technology Cleaning Government Budget Infrastructure Save Time Avoiding Downtime Comparison Firewall Employer-Employee Relationship Public Cloud Virtual Assistant IT Management Google Docs Downtime IT Support Spam Blocking Content Management Machine Learning Hiring/Firing Physical Security Saving Money Telephone System IT Plan Website Data storage Fraud YouTube Patch Management Telephony End of Support Blockchain Access Control USB Software as a Service Windows 7 Remote Monitoring Risk Management Assessment Administrator Outlook Instant Messaging IT solutions Cortana Wire Streaming Media Two Factor Authentication webinar Net Neutrality Fax Server Accountants Unified Threat Management Monitor Amazon Thought Leadership IT Consultant Smartwatch Skype Internet exploMicrosoft Users HIPAA NIST Authentication Troubleshooting Supercomputer Shortcuts Flash iPhone Recycling Lithium-ion battery Computer Accessories MSP Screen Mirroring Environment Politics Television Microchip Frequently Asked Questions Millennials Relocation Google Apps Smart Office Conferencing ISP Information Technology Vendor Management Camera Software Tips Multi-Factor Security Reputation Amazon Web Services NarrowBand Transportation Samsung Solid State Drive Employee Start Menu Advertising Virtual Reality Techology Maintenance Remote Work Nanotechnology Vendor Criminal Bluetooth File Sharing Cast Computer Care Practices Uninterrupted Power Supply Public Computer Search Engine Excel Workforce Humor Workers Document Management Emails Cryptomining Travel Going Green Content Trending Customers Online Shopping Addiction Distributed Denial of Service Wireless Technology Benefits Leadership Audit Digital Signage Tools Worker Commute Staff Safe Mode People Smart Tech Books Current Events Display Sync Files Education HVAC WiFi Hosted Computing Experience Bing Tip of the week Telecommuting Search Root Cause Analysis Database Laptop Wireless Programming Biometrics Audiobook SaaS Warranty Video Games Evernote Cache Chromecast Computer Fan Google Search Customer Relationship Management Mobile Office Credit Cards Emergency Knowledge Security Cameras Computing Infrastructure Enterprise Content Management Notifications Worker Remote Worker Inventory Tech Support Music Automobile Help Desk Windows Server 2008 How to Password Manager Business Technology Touchpad Printer HBO Specifications Scalability Wireless Charging Wireless Internet Smart Technology FENG Proactive IT Value Hybrid Cloud Customer Service Digital Signature Wiring Shortcut Devices Network Congestion Windows 10s Hacker Social Networking Password Management Rootkit Running Cable Shadow IT IBM Apple Business Mangement Employer Employee Relationship Netflix Data loss Biometric Security Compliance Managing Stress Regulation Twitter Thank You CrashOverride Printers Congratulations Webinar IT solutions Company Culture
QR-Code