Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Block Telemarketers and Other Annoying Callers From Your Android Device

b2ap3_thumbnail_block_callers_400.jpgCalls from telemarketers are the worst. These unwelcomed calls are especially annoying if you’re trying to be productive, and you’re interrupted in the middle of the workday by the same number repeatedly. Thankfully, more recent models of Android smartphones have the capabilities to blacklist numbers built right into the device. Here’s how it’s done.

Continue reading
0 Comments

3 Favorite Technologies Politicians Use to Connect With Voters

b2ap3_thumbnail_campaign_it_400.jpgTechnology is everywhere. Coincidentally, that is exactly where every political candidate wants to be. With the 24/7 news cycle and social media leading the charge, technology has become one of the most important aspects of election season. The lead-up to any election is a tense time for the candidates, and for their supporters. With public arguments being had about different philosophies, ideologies, and platforms, it’s important to understand how today’s candidates handle technology while on the campaign trail.

Continue reading
0 Comments

What Can Your Business Learn From Uber’s Successful Use of Technology?

b2ap3_thumbnail_uber_is_growing_fast_400.jpgAt a tradeshow event last month Travis Kalanick, co-founder and CEO of Uber, was interviewed about the future of Uber and transportation. He replied with a bold vision that speaks to how much technology has the potential to change things. According to Kalanick, “Every car should be Uber.”

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Business Computing Microsoft Computer Productivity Business Upgrade Hardware Network Security Backup Google User Tips Hosted Solutions Small Business Operating System Social Media Smartphone Bandwidth Ransomware The Internet of Things Efficiency Mobile Devices IT Support Gmail Workplace Tips Windows Innovation Smartphones Content Filtering Money Safety Outlook Website Quick Tips Windows 10 Passwords Apple Best Practice Android Hacking Communication Microsoft Office Apps Saving Money Big Data BDR Two-factor Authentication Data storage Business Continuity Data Facebook Disaster Recovery Networking Mobile Device Management Holiday Business Growth Spam Artificial Intelligence Network Micrsooft Running Cable Writing Firewall Society Downtime Lithium-ion battery Google Wallet Gadgets Customer Service Social Robot Documents Windows 8 Hosted Solution Virtual Desktop Wireless Technology communications App Retail Tech Support SaaS Phishing Drones Automation Unified Communications Managed IT services Domains Printer Alert Sports Search Deep Learning Analytics Bluetooth Document Management Internet of Things Cybercrime Law Enforcement Office Mobile Computing Securty Memory Education Compliance Network Congestion Experience Vendor Management Save Money Proactive IT YouTube LiFi Browser Monitors IP Address Cryptocurrency Data Recovery Office 365 Music Streaming Media Visible Light Communication Encryption Google Docs Disaster Displays Cleaning Laptop Hacker Advertising Recovery History Augmented Reality BYOD Black Market Information Technology WiFi Office Tips End of Support Remote Computing

Newsletter Sign Up

  • First Name *
  • Last Name *