Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating a New Google Account? Here’s How to Transfer Your Contacts

b2ap3_thumbnail_migrate_contacts_from_google_400.jpgDoes your organization use Google Apps for Business? It’s likely you use Google Contacts to store contacts. It’s an ideal tool for business professionals who are constantly on the move, but the real value that it presents is its instantaneous access to work contacts through Android devices. For this week’s tip, we’ll walk you through how to import and export your Google Contacts to a different Google, Outlook, or Apple account.

Continue reading
0 Comments

Tip of the Week: Turn Your Favorite Email Client into Gmail on Your Android Device

b2ap3_thumbnail_gmail_your_inbox_400.jpgEven though Google would prefer it if everyone switched over to Gmail as their primary email client, this simply isn’t going to happen. Many businesses are set in their ways, and would prefer to use Microsoft Outlook. Other users might still be in the days of Yahoo Mail for their personal email account. It’s to the users of other email clients that Gmailify is targeted.

Continue reading
0 Comments

Tip of the Week: 3 Steps to Find Your Email Message in Gmail

b2ap3_thumbnail_search_gmail_400.jpgIf your business uses Gmail as its preferred email client, then you know that it’s a great way to keep communications running smoothly. Sometimes, however, a message might fall through the cracks, and you’ll need to locate it in order to acquire certain information. Gmail has made it easy to locate lost messages with their search feature.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Computer Productivity Business Business Computing Microsoft Hardware Backup Network Security User Tips Hosted Solutions Upgrade Google The Internet of Things Operating System Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Social Media Smartphone Ransomware Gmail Saving Money Mobile Device Management Big Data Two-factor Authentication Business Continuity Smartphones Outlook Facebook Networking Apple Windows Best Practice Communication Innovation Apps Content Filtering Safety Money BDR Website Quick Tips Data storage Windows 10 Passwords Data Android Hacking Disaster Recovery Microsoft Office Office Tips Compliance Information Technology Experience End of Support Business Growth Spam Micrsooft Browser Artificial Intelligence Society IP Address Writing Google Wallet Office 365 Robot Encryption Social Windows 8 Disaster Hosted Solution Laptop Virtual Desktop Hacker communications Retail Tech Support Recovery Augmented Reality Drones SaaS Unified Communications WiFi Automation Managed IT services Printer Remote Computing Holiday Alert Network Deep Learning Bluetooth Document Management Running Cable Firewall Lithium-ion battery Gadgets Law Enforcement Downtime Customer Service Office Memory Documents Network Congestion Education Save Money Wireless Technology Vendor Management Proactive IT App YouTube Phishing LiFi Cryptocurrency Monitors Data Recovery Music Streaming Media Domains Search Google Docs Sports Visible Light Communication Cleaning Analytics Displays Cybercrime Internet of Things Advertising BYOD Mobile Computing History Black Market Securty

Newsletter Sign Up

  • First Name *
  • Last Name *