Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Block Telemarketers and Other Annoying Callers From Your Android Device

b2ap3_thumbnail_block_callers_400.jpgCalls from telemarketers are the worst. These unwelcomed calls are especially annoying if you’re trying to be productive, and you’re interrupted in the middle of the workday by the same number repeatedly. Thankfully, more recent models of Android smartphones have the capabilities to blacklist numbers built right into the device. Here’s how it’s done.

Continue reading
0 Comments

3 Favorite Technologies Politicians Use to Connect With Voters

b2ap3_thumbnail_campaign_it_400.jpgTechnology is everywhere. Coincidentally, that is exactly where every political candidate wants to be. With the 24/7 news cycle and social media leading the charge, technology has become one of the most important aspects of election season. The lead-up to any election is a tense time for the candidates, and for their supporters. With public arguments being had about different philosophies, ideologies, and platforms, it’s important to understand how today’s candidates handle technology while on the campaign trail.

Continue reading
0 Comments

What Can Your Business Learn From Uber’s Successful Use of Technology?

b2ap3_thumbnail_uber_is_growing_fast_400.jpgAt a tradeshow event last month Travis Kalanick, co-founder and CEO of Uber, was interviewed about the future of Uber and transportation. He replied with a bold vision that speaks to how much technology has the potential to change things. According to Kalanick, “Every car should be Uber.”

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Productivity Business Business Computing Microsoft Computer Hardware Network Security Backup User Tips Hosted Solutions Upgrade Google The Internet of Things Operating System Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Social Media Smartphone Gmail Ransomware Two-factor Authentication Business Continuity Smartphones Outlook Facebook Networking Apple Best Practice Windows Communication Apps Innovation Content Filtering Money Safety BDR Data storage Website Quick Tips Windows 10 Data Passwords Disaster Recovery Android Hacking Mobile Device Management Microsoft Office Saving Money Big Data Society Writing Browser Google Wallet IP Address Robot Social Windows 8 Office 365 Encryption Hosted Solution Virtual Desktop Disaster communications Laptop Tech Support Retail Drones SaaS Hacker Augmented Reality Automation Recovery Unified Communications Printer Managed IT services WiFi Alert Remote Computing Deep Learning Holiday Document Management Bluetooth Law Enforcement Network Firewall Office Running Cable Downtime Lithium-ion battery Gadgets Memory Network Congestion Education Customer Service Vendor Management Documents Save Money Proactive IT YouTube Wireless Technology LiFi Monitors App Cryptocurrency Data Recovery Phishing Music Streaming Media Google Docs Visible Light Communication Cleaning Domains Displays Sports Search Analytics Advertising BYOD History Internet of Things Black Market Cybercrime Mobile Computing Office Tips Information Technology Securty End of Support Compliance Business Growth Spam Micrsooft Experience Artificial Intelligence

Newsletter Sign Up

  • First Name *
  • Last Name *