Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Review This Checklist to Make Sure You’re Not Running Recently Expired Software

b2ap3_thumbnail_end_of_life_microsoft_support_400.jpgEvery piece of software released by Microsoft has an expiration date. Known as the End of Life event, this is when Microsoft ceases to support the software. It’s imperative that you stay on top of EOL dates for the sake of your company’s operations and data security. Take for example the dozens of software titles that expired just this past April.

Continue reading
0 Comments

This Computer Software Can Probably Write a Better Story Than You

b2ap3_thumbnail_automated_writers_400.jpgArtificial intelligence is still a long way off, but this doesn’t stop people from trying to make major advancements in how AI thinks. Take, for example, a Japanese novella (a short novel) co-written by AI that almost won the Hoshi Shinichi Award literary prize. That’s the key word here, though: almost. It seems that AI still has quite a bit of progress to make before it can effectively replicate human creativity.

Continue reading
0 Comments

Tip of the Week: How to Customize Your Mouse Pointer in Windows 10

b2ap3_thumbnail_change_your_point_400.jpgWindows 10 offers plenty of ways you can customize how your mouse pointer looks and functions, which can make navigating your PC much easier. Here’s how to do it!

Continue reading
0 Comments

Tip of the Week: How to Find Out if an Email Address is Valid

b2ap3_thumbnail_email_address_found_400.jpgHave you ever spent time writing an email to somebody that you haven’t emailed before, hit send, and then wondered if the email address is even valid? For the active email user, this is an all-too-common scenario. How can you know for sure if an email address is valid before sinking time into writing a message?

Continue reading
0 Comments

Virtualized Computing: Understanding the Differences Between VDI and DaaS

b2ap3_thumbnail_vdi_saas_400.jpgWhen it comes to implementing virtualization technology for your business, you’ve got multiple options to choose from, with two, in particular, standing out; virtualization desktop infrastructure (VDI) and Desktop as a Service (DaaS). Going with the right technology is paramount to the success of your business. Here are some tips on how to choose between the two.

Continue reading
0 Comments

Tip of the Week: 2 Tools that Let You Edit Like a Pro

b2ap3_thumbnail_compare_with_diff_checker_400.jpgEditing text can be a rather drawn out process. Thankfully, technology has made editing much easier than it was back in the day when papers were marked up with red ink and notes like “F- See me after class.” Here are two great editing tools that you will want to take advantage of.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Business Business Computing Microsoft Computer Productivity User Tips Hosted Solutions Google Upgrade Hardware Network Security Backup Workplace Tips Small Business Gmail Social Media Smartphone Operating System Ransomware The Internet of Things Bandwidth Efficiency Mobile Devices IT Support BDR Data storage Networking Windows Data Disaster Recovery Innovation Content Filtering Money Safety Mobile Device Management Website Quick Tips Windows 10 Passwords Smartphones Android Hacking Outlook Microsoft Office Saving Money Big Data Two-factor Authentication Apple Best Practice Business Continuity Communication Apps Facebook Recovery Augmented Reality Proactive IT YouTube LiFi Monitors Cryptocurrency WiFi Data Recovery Remote Computing Music Streaming Media Visible Light Communication Holiday Google Docs Displays Cleaning Network Running Cable Firewall Advertising Downtime Lithium-ion battery Gadgets History Customer Service BYOD Documents Black Market Information Technology Office Tips Wireless Technology End of Support App Business Growth Spam Artificial Intelligence Phishing Micrsooft Writing Society Domains Google Wallet Social Sports Search Robot Analytics Windows 8 Hosted Solution Virtual Desktop communications Internet of Things Cybercrime Retail Mobile Computing Tech Support Securty Drones SaaS Unified Communications Compliance Automation Experience Managed IT services Printer Alert Deep Learning Browser Bluetooth IP Address Document Management Office 365 Law Enforcement Office Encryption Disaster Memory Education Laptop Network Congestion Vendor Management Hacker Save Money

Newsletter Sign Up

  • First Name *
  • Last Name *