Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: PDF

Know Your Tech: PDF

For computer enthusiasts one of the major questions has always been Mac vs. PC. Most people prefer one over the other, while some are fine using either. The problem with having two popular non-compatible computer systems is that they each use proprietary file types. For documents, the answer was developed by Adobe: the PDF. Today, we’ll take a look at Portable Document Format.

0 Comments
Continue reading

Know Your Tech: Proxy Server

Know Your Tech: Proxy Server

Your server room may be somewhat intimidating to consider. Wires everywhere, mechanical boxes that just sit there, lights blinking intermittently, and the distinct feeling that you probably shouldn’t touch anything - not even a proxy server, whatever that is. However, to help you get to know your tech, the proxy server is exactly what we discuss below!

0 Comments
Continue reading

Know Your Tech: Social Media

Know Your Tech: Social Media

You see the term “social media” thrown around all the time, but what does it mean for both individual users and whole businesses? Organizations that understand the importance of social media have a unique advantage over other businesses in the same industry, be it a way to attract more consumers or a way to protect against common security threats that find their home on these websites.

0 Comments
Continue reading

Know Your Tech: Encryption Key

Know Your Tech: Encryption Key

Security is a necessity. Every technology professional will tell you this, but in an age where employees are taking information on the go, it’s trickier than it’s ever been before. Encryption is one of the ways that businesses are attempting to shore up their security, but this also requires having an encryption key. This week’s technology term is all about encryption, as well as how encryption keys protect your business’ data.

0 Comments
Continue reading

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

0 Comments
Continue reading

Know Your Tech: CMS

Know Your Tech: CMS

Marketing is increasingly critical to a business’ success, especially when it comes to the use of content as an impressions generator. This makes it all the more important for your content to be well organized and managed. Here, we’ll go over a few options you have as far as content management systems are concerned, and how they make maintaining your content strategy that much simpler.

0 Comments
Continue reading

Is USB Type-C the Answer for Fast Data Transfer?

Is USB Type-C the Answer for Fast Data Transfer?

You might use USB every day for your general technology needs, but do you know the difference between the various kinds of USB? This week’s tech term is dedicated to investigating the different types of Universal Serial Bus (USB) ports, including its history, development, and uses.

0 Comments
Continue reading

Know Your Tech: Cache

Know Your Tech: Cache

If you hang out around technology professionals for any period of time, chances are that you’ve heard the word “cache” used before. The word, pronounced cash, is usually heard in the phrase, “clear the cache,” but if you don’t know what this phrase means, how can you benefit from it? Since this week’s tech term is “cache,” let’s get into the details.

0 Comments
Continue reading

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Tech Term: Cookies Defined

Tech Term: Cookies Defined

Chances are, if you’ve spent any amount of time around a computer, you’ve heard of browser cookies. What you may not have heard, is what these cookies do. For today’s Tech Term, we’ll explore what cookies are, and what they do.

0 Comments
Continue reading

Tech Term: Modems and Routers Defined

Tech Term: Modems and Routers Defined

The Internet is an amazing tool, only bolstered by our ability to access it wirelessly - but what do you know about the devices that allow us to access it, namely, modems and routers? Do you know what each does? For today’s tech term, we’ll dive into exactly that.

0 Comments
Continue reading

Tech Term: Defining Motherboard

Tech Term: Defining Motherboard

Inside its casing, your computer contains many parts. While these parts may not be moving, they are hard at work, enabling you to use your computer to accomplish your goals. For today’s Tech Term, we’ll take a closer look at just one, the motherboard, and examine what it contributes to your device’s operation.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Backup Malware Hosted Solutions Network Security Microsoft Mobile Devices Software Data Windows 10 Innovation User Tips Internet Smartphones Business Email Browser Hardware Tech Term Efficiency Computer Business Continuity Disaster Recovery Smartphone Productivity VoIP Miscellaneous Ransomware IT Services Data Backup Workplace Tips Productivity communications Cybercrime Business Management Android Network Office Automation Outsourced IT Chrome Windows Cloud Computing Data Recovery Alert Telephone Systems Artificial Intelligence Save Money Managed IT Services Upgrade Computers Router Managed IT Services Server Internet of Things Communication Windows 10 Social Media Cybersecurity Small Business Virtualization Quick Tips Facebook Money Collaboration Law Enforcement Social Engineering Applications IT Support Wi-Fi Office 365 Password Office Tips Passwords How To Spam App Holiday Health Gmail Operating System Mobile Device Management History Settings Google Drive Remote Computing BDR Mobile Device Word Two-factor Authentication Information Work/Life Balance Bandwidth Bring Your Own Device Gadgets Managed Service Microsoft Office Data Protection Flexibility Scam Mouse Managed Service Provider Vulnerability Safety Voice over Internet Protocol Connectivity Mobility Entertainment Apps Keyboard Marketing Networking Data Breach Application Private Cloud Encryption Recovery Sports HaaS Data Security Data Management Hacking Phishing VPN Windows 7 Infrastructure Paperless Office Remote Monitoring Physical Security YouTube Software as a Service Training Managed IT Data storage Virtual Assistant Business Intelligence End of Support Content Management eWaste Mobile Computing Unsupported Software PDF Machine Learning Robot Update The Internet of Things Retail OneNote Botnet Telephone System Internet Exlporer Blockchain Big Data Fraud Redundancy Best Practice Access Control Electronic Medical Records DDoS Charger Social Legal Budget Black Market User Error BYOD Battery Data Storage Avoiding Downtime Firewall Employer-Employee Relationship Human Resources Wearable Technology Cleaning Comparison Spam Blocking Servers Saving Money IT Management Google Docs Government Hiring/Firing Public Cloud Downtime IT Support Patch Management Telephony CES USB Meetings IT Plan Website Identity Theft Hybrid Cloud Risk Management Hacker Assessment Data loss Hosted Computing Scalability Wiring Two Factor Authentication webinar IT Consultant Running Cable Shadow IT Outlook Evernote Cache Streaming Media Skype Enterprise Content Management Troubleshooting Supercomputer Credit Cards Apple Administrator Computer Accessories Flash Password Manager Politics Smartwatch Television Screen Mirroring Inventory Instant Messaging Unified Threat Management Conferencing Shortcuts Vendor Management Lithium-ion battery Monitor Digital Signature MSP Transportation Samsung Maintenance Frequently Asked Questions Millennials Wireless Charging Internet exploMicrosoft Wireless Internet Users Bluetooth Solid State Drive Start Menu Password Management Environment Software Tips Multi-Factor Security iPhone Devices Microchip Business Mangement Information Technology Public Computer Cast Computer Care Relocation Camera Emails NarrowBand Virtual Reality Content Vendor Travel Reputation Accountants File Sharing Benefits Leadership Excel Workforce Cortana Advertising Wire Search Engine Audit Tools HIPAA Techology NIST Books Current Events Programming Uninterrupted Power Supply Biometrics Trending Amazon Thought Leadership Sync Going Green Recycling Experience People Customer Relationship Management WiFi Humor Authentication Save Time Distributed Denial of Service Wireless Technology Smart Office Worker Commute Audiobook Display SaaS Root Cause Analysis Customers Augmented Reality Tip of the week Telecommuting Google Apps Bing Worker Computer Fan Cryptocurrency Emergency Knowledge Amazon Web Services Files Education Chromecast Laptop Criminal Wireless Music Automobile Mobile Office Customer Service Remote Work Nanotechnology Search Warranty Workers Document Management Security Cameras Notifications Social Networking Practices Video Games Remote Worker Smart Technology Shortcut Windows Server 2008 Help Desk Rootkit FENG Value Staff Safe Mode Network Congestion Tech Support HBO Specifications Online Shopping Addiction Computing Infrastructure IT solutions Windows 10s Touchpad HVAC IBM Fax Server Smart Tech How to Printer Employer Employee Relationship Netflix Thank You Company Culture Congratulations CrashOverride Compliance Managing Stress Printers Webinar Regulation Twitter IT solutions
QR-Code