Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Internet Providers Have Started the 5G Trend

Internet Providers Have Started the 5G Trend

5G will be here eventually, but it’s just a matter of “when” it will arrive. It feels like we’ve been saying that 5G will arrive soon, but the fact remains that it’s not here… at this moment, anyway. Still, the ambiguity surrounding 5G, or the “Fifth Generation” of wireless networking, can get a bit confusing. We’ll help you clear up any confusion you might have about 5G so you can step into the future knowing what this technology might hold.

Continue reading
0 Comments

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Continue reading
0 Comments

Getting to Know Technology: Link

Getting to Know Technology: Link

Navigation is important for any computing system--particularly the Internet, where there are countless destinations. The Internet is comprised of various web pages, images, videos, and many other valuable little bits of content that are all connected by a web of links. These links are the cornerstone of the Internet, and we’ll explain the details of how they work and what they are.

Continue reading
0 Comments

Getting to Know Technology: Breadcrumbs

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

Continue reading
0 Comments

Google’s Inflated Plan to Get the Internet to Billions of People Who Don’t Have It

Google’s Inflated Plan to Get the Internet to Billions of People Who Don’t Have It

It’s hard to believe that half of the world still doesn’t have access to the Internet. When so many people in the west take their near-ubiquitous Internet accessibility for granted, over three and half billion people don’t have access at all. Years ago, Google created what came to be known as X (or Google X) which was basically a research-and-development facility.

Continue reading
0 Comments

The Chrome Browser is Redefining Your Security

The Chrome Browser is Redefining Your Security

When you are surfing the web, do you know if you are secure? Typically, your browser will tell you when a site is secure or not. This is especially important if you are putting in sensitive information, like passwords or credit card information. Google Chrome is stepping up it’s game to keep users safe.

Continue reading
0 Comments

Three Reasons VoIP is a Great Choice for Businesses

Three Reasons VoIP is a Great Choice for Businesses

If you’re trying to run your business without considering communication, you’re crippling your business unnecessarily. One of the ways that you can improve communications is by capitalizing on a modern phone system that uses the cloud. You might be surprised by how great a cloud-hosted VoIP solution works for your business--especially if you haven’t thrown out the traditional telephone handset yet.

Continue reading
0 Comments

Getting to Know Technology: Plug-In

Getting to Know Technology: Plug-In

The Internet is an amazing tool in and of itself, but like many tools, it can sometimes work better if other tools are used alongside it. These additional tools are called plug-ins. Here, we’ll discuss what a plug-in is, and how they all help us use the Internet a little better.

Continue reading
0 Comments

Tech Term: Router

Tech Term: Router

The more that people depend on mobile devices and portable computers to get work done, the more businesses have to consider how to manage their organization’s wireless network. The router is the piece of hardware that makes the wireless network possible. Today, we will talk a little bit about the router and how its configuration can dictate the strength, reliability, and security of your business’ wireless network.

Continue reading
0 Comments

Tech Term: Understanding HTML and Plain Text

Tech Term: Understanding HTML and Plain Text

During your time around computers, chances are high that you’ve heard the phrase “plain text” and the acronym “HTML” tossed around when it comes to your email. If you aren’t sure what these statements refer to, we’re here to help. Today, we’ll examine both HTML and plain text to produce a better understanding of these tech terms.

Continue reading
0 Comments

Tip of the Week: Awareness Is Important When Surfing the Web

Tip of the Week: Awareness Is Important When Surfing the Web

We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing.

Continue reading
0 Comments

Tip of the Week: Are You at Risk Due to the IoT?

Tip of the Week: Are You at Risk Due to the IoT?

The Internet of Things is now a commonality. IoT devices are in our homes, in our offices, and in our pockets. While these devices are incredibly convenient, they also contribute to some major security risks. For today’s tip, we’ll review some of the ways to reduce these risks while still leveraging the IoT.

Continue reading
0 Comments

Tip of the Week: Keeping Productivity Up When the Internet is Down

Tip of the Week: Keeping Productivity Up When the Internet is Down

Modern businesses rely pretty heavily on the Internet--so much so that, should the Internet go down, many employees will find themselves at a loss as what to do. However, there’s no need to sacrifice productivity just because your Internet isn’t cooperating. There are plenty of ways to get something done on a day that the Internet calls in sick, which we’ll go over for today’s tip.

Continue reading
0 Comments

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

It’s seems unbelievable just how much thought and effort hackers can put into their attacks. Scammers are all over the place, and you can never truly be safe. Here are six scams that you should always be on the lookout for.

Continue reading
0 Comments

Tip of the Week: How to Use Webinars to Take Your Business to the Next Level

Tip of the Week: How to Use Webinars to Take Your Business to the Next Level

Authority. Knowing what your business does well, and using that knowledge, experience, and expertise to increase your company’s position within the market is more crucial for the small business today than ever before. This is because, from a competitive standpoint, the small or midsize business is not able to sport the kind of prices that larger firms can, and still make a profit. One way an organization can utilize this talent to increase the visibility of their offering is by using webinars.

Continue reading
0 Comments

Tip of the Week: How To Troubleshoot a Faulty Internet Connection

Tip of the Week: How To Troubleshoot a Faulty Internet Connection

An Internet connection is one of the most crucial parts of running a modern business. However, this type of reliance can be crippling in the event that the Internet goes down. What can you do to make sure that downtime is limited to a minimum?

Continue reading
0 Comments

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Sherlock Holmes is one of the most famous detectives in fiction, but without his dear Dr. Watson, he would have been stumped on occasion. There’s a good reason why IBM named its super-intelligent computer, Watson, after the famous character. True to its namesake, Watson is now being used to safeguard 40 organizations from cyber security threats.

Continue reading
0 Comments

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.

Continue reading
0 Comments

A Fascinating Look at How the Internet Has Changed the Stock Market

A Fascinating Look at How the Internet Has Changed the Stock Market

When you think about the stock market, one vibrant image that comes to mind is the chaotic trading floor of the New York Stock Exchange, with traders climbing over each other and barking orders. Today, the NYSE trading floor is much more subdued, a testimony to just how much technology has changed the financial marketplace.

Continue reading
0 Comments

3 Ways the Internet Makes Things Easier, But Not Necessarily Better

3 Ways the Internet Makes Things Easier, But Not Necessarily Better

Do you remember the days where you didn’t have the the Internet? Remember going to the library to research information, or using a phone book to find contact information for an important contact? These are only a few ways that the Internet has changed society.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersGoogleEfficiencyBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareMobile DevicesNetwork SecurityBusinessIT ServicesHardwareProductivityUpgradeComputerwindowsCommunicationEmailDataSmartphonesIT SupportMiscellaneousSaving MoneyGadgetsVirtualizationSmartphoneAppsWindows 10Disaster RecoveryBusiness ContinuitySmall BusinessNetworkVoIPServerBrowserMobile Device ManagementMicrosoft OfficeSocial MediaInformation TechnologyTech TermHealthAndroidMobile ComputingQuick TipsPasswordsCybersecurityData BackupHolidayGoing GreenOperating SystemWindows 10Data RecoveryMobile OfficeOffice 365ChromeSave MoneycommunicationsOfficeUsersCollaborationspamBYODCybercrimeAppApplicationInternet of ThingsOutsourced ITAlertBest PracticeEmployer-Employee RelationshipData SecurityLaw EnforcementMarketingManaged IT ServicesSearchIT SupportRansomwareAppleVendor ManagementWiFiBring Your Own DeviceRemote ComputingWirelessTabletPhishingThe Internet of ThingsFacebookWearable TechnologyHistoryAvoiding DowntimeAutomationMobilityiPhoneHackingRouterRisk ManagementWireless TechnologyMoneyCost ManagementBDRMaintenanceSaving TimeUser ErrorRemote MonitoringUnified Threat ManagementAntivirusArtificial IntelligenceOffice TipsPasswordIT SolutionsTech SupportBig DataData ManagementComputersHard DrivesEncryptionSocialCloud ComputingTelephone SystemsOneNoteGovernmentBandwidthCustomer Relationship ManagementVPNHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralityEducationPrinterInformationManaged IT ServicesOutlookShortcutUnsupported SoftwareGmailUSBNetworkingPowerPointAnalyticsWi-FiSocial NetworkingVulnerabilityProactive ITFirewallBudgetLithium-ion batteryGoogle DriveCurrent EventsPhone SystemContent FilteringApplicationsDisasterManaged ITBatteryPersonal InformationBlockchainTelevisionRetailExcelPaperless OfficeIdentity TheftWordMeetingsTelephonyTravelIT COnsultantWork/Life BalanceManaged ServiceComputer RepairSocial EngineeringMobile DeviceStreaming MediaPoliticsTrendingVirusAuditEntertainmentadministrationIntranetRecoveryLaptopAugmented RealitySaaSWannaCryData BreachValuePoint of SaleProject ManagementTouchscreenCortanaPrinter ServerHybrid CloudHaaSEvernoteSamsungWindows 8ProgrammingManaging StressTwitterStorageAutomobileDisplayCleaningAmazonPrintingOneDriveHosted SolutionSave TimeData ProtectionComputer CareBusiness IntelligenceFax ServerGoogle AssistantConferencinghackerCustomer ServiceIT ManagementComputingBiometricsPrivate CloudDevicesVirtual RealityLegalHIPAATransportationEnd of SupportInternet ExlporerCommercePatch ManagementYoutubeHuman ResourcesData LossFlexibilityDDoSEmailsFraudInstant MessagingGoogle DocsOnline CurrencyHard DriveBusiness TechnologyUninterrupted Power SupplySportsData StorageSalesScamBenefitseWasteWireless ChargingComputer AccessoriesAccess ControlFile SharingMobile SecurityFinancialIntrantetMouseBooksTouchpadCameraChromecastCastAdminWIndows 7Black MarketBloggingTutorialIdentity5GMonitorsNetwork CongestionElectronic Medical RecordsHelp DeskRegulationsProjectsIT budgetKeyboard ShortcutsDebateLicensingBluetoothWebinarLegislationData PrivacyEmployeesVirtual AssistantNanotechnologyWorkersSafetyjunkOperating SysytemCamerasCo-managed ITWindows 7PayrollTrainingTabletsVoice over Internet ProtocolSharePointIT solutionsComparisonUserChromebookAlexa for BusinessRoot Cause AnalysisUpdatesHBOfilterPresentationCo-Managed ServicesIdentitiesSecurity CamerasVirtual DesktopCompany CultureNFLSabotageTeamworkWindows 10sSpecificationsBest AvailablePrint ServerLifestyleMicrosoft WordScienceReputationTelephoneLanguageMachine LearningPCSolid State DriveWorker CommuteEbayAdministratorSoftware as a ServiceSettingsDevice SecurityKeyboardWindows InkVideo GamesHyperlinkDowntimeBuisnessComputer ForensicsSmartwatchRunning CableHard Disk DriveGiftsAccessHiring/FiringWIndows Server 2008Google MapsNear Field CommunicationWasting TimeProactiveE-CommerceManagementServer MaintenanceNokiaCredit Cards3D PrintingVendorGift GivingSpywareSmart TechnologyIT consultingAccessorySurge ProtectorWebsitesPayment CardsWireless InternetInvestmentFAQRobotAdvertisingEmployee-Employer RelationshipMicrobloggingSyncReliable ComputingScalabilityPeripheralData TheftEmployeeGamificationROIDistributed Denial of ServiceiOSChargerExperienceComplianceData storagePDFEdgeBloatwareUpgradesMicrosoft ExcelHow ToApp storeBreak/FixMemoryComputer FanMusicInbound MarketingImagesText MessagingCommunityTestingFilesScreen MirroringCiminalWebinarEmployer Employee RelationshipAdobeBrandingConsultantISPMedical IT