Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Review This Checklist to Make Sure You’re Not Running Recently Expired Software

b2ap3_thumbnail_end_of_life_microsoft_support_400.jpgEvery piece of software released by Microsoft has an expiration date. Known as the End of Life event, this is when Microsoft ceases to support the software. It’s imperative that you stay on top of EOL dates for the sake of your company’s operations and data security. Take for example the dozens of software titles that expired just this past April.

Continue reading
0 Comments

This Computer Software Can Probably Write a Better Story Than You

b2ap3_thumbnail_automated_writers_400.jpgArtificial intelligence is still a long way off, but this doesn’t stop people from trying to make major advancements in how AI thinks. Take, for example, a Japanese novella (a short novel) co-written by AI that almost won the Hoshi Shinichi Award literary prize. That’s the key word here, though: almost. It seems that AI still has quite a bit of progress to make before it can effectively replicate human creativity.

Continue reading
0 Comments

Tip of the Week: How to Customize Your Mouse Pointer in Windows 10

b2ap3_thumbnail_change_your_point_400.jpgWindows 10 offers plenty of ways you can customize how your mouse pointer looks and functions, which can make navigating your PC much easier. Here’s how to do it!

Continue reading
0 Comments

Tip of the Week: How to Find Out if an Email Address is Valid

b2ap3_thumbnail_email_address_found_400.jpgHave you ever spent time writing an email to somebody that you haven’t emailed before, hit send, and then wondered if the email address is even valid? For the active email user, this is an all-too-common scenario. How can you know for sure if an email address is valid before sinking time into writing a message?

Continue reading
0 Comments

Virtualized Computing: Understanding the Differences Between VDI and DaaS

b2ap3_thumbnail_vdi_saas_400.jpgWhen it comes to implementing virtualization technology for your business, you’ve got multiple options to choose from, with two, in particular, standing out; virtualization desktop infrastructure (VDI) and Desktop as a Service (DaaS). Going with the right technology is paramount to the success of your business. Here are some tips on how to choose between the two.

Continue reading
0 Comments

Tip of the Week: 2 Tools that Let You Edit Like a Pro

b2ap3_thumbnail_compare_with_diff_checker_400.jpgEditing text can be a rather drawn out process. Thankfully, technology has made editing much easier than it was back in the day when papers were marked up with red ink and notes like “F- See me after class.” Here are two great editing tools that you will want to take advantage of.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Hardware Network Security Backup User Tips Hosted Solutions Google Upgrade Operating System Ransomware The Internet of Things Efficiency Mobile Devices IT Support Bandwidth Workplace Tips Small Business Social Media Gmail Smartphone Passwords Android Hacking Smartphones Microsoft Office Saving Money Outlook Big Data Two-factor Authentication Business Continuity Apple Best Practice Facebook Communication Apps Networking BDR Data storage Windows Innovation Content Filtering Money Safety Data Disaster Recovery Website Quick Tips Windows 10 Mobile Device Management Spam Sports Search Business Growth Micrsooft Analytics Artificial Intelligence Writing Society Internet of Things Cybercrime Google Wallet Robot Mobile Computing Social Securty Windows 8 Virtual Desktop Compliance Hosted Solution Experience communications Retail Tech Support SaaS Browser Drones Automation IP Address Unified Communications Managed IT services Office 365 Printer Alert Encryption Disaster Deep Learning Laptop Bluetooth Document Management Law Enforcement Hacker Recovery Office Augmented Reality Memory WiFi Network Congestion Education Vendor Management Remote Computing Save Money YouTube Holiday Proactive IT Network LiFi Running Cable Monitors Firewall Cryptocurrency Gadgets Streaming Media Downtime Data Recovery Lithium-ion battery Music Google Docs Customer Service Visible Light Communication Documents Displays Cleaning Wireless Technology Advertising App History BYOD Phishing Black Market Office Tips Information Technology End of Support Domains

Newsletter Sign Up

  • First Name *
  • Last Name *