Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Getting to Know Technology: Breadcrumbs

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

Continue reading
0 Comments

Getting to Know Technology: Hackers

Getting to Know Technology: Hackers

It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Below, we explore what makes a hacker, and the kinds that exist in reality.

Continue reading
0 Comments

Getting to Know technology: Software as a Service

Getting to Know technology: Software as a Service

Thanks to the public cloud, which has amassed around $150 billion in annual revenues, the software as a service model has grown tremendously. In fact, it’s grown by approximately 20 percent a year for the past five years. The public cloud currently houses over a third of all applications used worldwide, making it a significant contributor to the success of software as a service (SaaS). Has your organization begun to take advantage of this phenomenon?

Continue reading
0 Comments

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

Continue reading
0 Comments

Getting to Know Technology: Plug-In

Getting to Know Technology: Plug-In

The Internet is an amazing tool in and of itself, but like many tools, it can sometimes work better if other tools are used alongside it. These additional tools are called plug-ins. Here, we’ll discuss what a plug-in is, and how they all help us use the Internet a little better.

Continue reading
0 Comments

Getting to Know Technology: Processor

Getting to Know Technology: Processor

A computer is a complicated device, so it needs something to help it “think.” Because of this weighty responsibility, the component that serves this purpose is arguably one of the most important of all a computer’s pieces. Known as a CPU, this little chip is truly essential to the computer’s function. For today’s Tech Term, we’ll examine it a little more closely.

Continue reading
0 Comments

Getting to Know Technology: RAM

Getting to Know Technology: RAM

Depending on who you ask, RAM will mean a different thing, but in computing, there is only one true meaning. RAM stands for Random Access Memory, and it’s a major component in your computer. But what exactly does it do, and what role does it play in ensuring that your organization stays productive and efficient?

Recent comment in this post
Connor Fulton
This information about the features of technology ram is very interesting and students of IT will get more knowledge. Hope you wil... Read More
Wednesday, 17 October 2018 09:48
Continue reading
1 Comment

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

Continue reading
0 Comments

Tech Term: Chromebook

Tech Term: Chromebook

It seems like everywhere you go, you can see a Chromebook. These specialty laptops have a few features that make them highly desirable in some circumstances, and poorly suited to others. Seeing as ‘Chromebook’ is our Tech Term for this week, why not take a few moments and examine them a little closer?

Continue reading
0 Comments

Tech Term: Hard Drive

Tech Term: Hard Drive

Most computer users know of the hard drive, but how many actually know what it does? Depending on who you ask, you’ll get different degrees of answers. It’s rare that you’ll encounter the ordinary person who knows what the hard drive is, as well as how it works or what it does. This week’s tech term is the hard drive, so let’s dig in.

Continue reading
0 Comments

Tech Term: Router

Tech Term: Router

The more that people depend on mobile devices and portable computers to get work done, the more businesses have to consider how to manage their organization’s wireless network. The router is the piece of hardware that makes the wireless network possible. Today, we will talk a little bit about the router and how its configuration can dictate the strength, reliability, and security of your business’ wireless network.

Continue reading
0 Comments

Tech Term: Virtualization

Tech Term: Virtualization

There are plenty of topics we reference frequently that may seem a little advanced or complicated at first but are actually pretty simple concepts. Take, for example, virtualization. For today’s tech term, we’ll take a clearer look at this method of computing.

Continue reading
0 Comments

Tech Term: What are Proxy Servers?

Tech Term: What are Proxy Servers?

While proxy server is a tech term that is frequently cited, it is not understood by a vast majority of people. Today we will describe what a proxy server is, and why organizations like yours use them.

Continue reading
0 Comments

Tech Term: Understanding HTML and Plain Text

Tech Term: Understanding HTML and Plain Text

During your time around computers, chances are high that you’ve heard the phrase “plain text” and the acronym “HTML” tossed around when it comes to your email. If you aren’t sure what these statements refer to, we’re here to help. Today, we’ll examine both HTML and plain text to produce a better understanding of these tech terms.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Business Management Hackers Efficiency Productivity Hosted Solutions User Tips Backup Innovation Managed Service Provider Workplace Tips Malware Business IT Services Mobile Devices Computer Hardware windows Network Security Upgrade Communication IT Support Miscellaneous Saving Money Email Productivity Virtualization Data Smartphones Windows 10 Gadgets Smartphone Apps Business Continuity VoIP Server Disaster Recovery Browser Microsoft Office Mobile Device Management Small Business Network Information Technology Tech Term Social Media Mobile Computing Passwords Health Android Quick Tips Cybersecurity Going Green Holiday Operating System Data Backup Mobile Office Save Money Windows 10 Office 365 Chrome Collaboration spam Outsourced IT Cybercrime communications App Application Office Alert Best Practice Law Enforcement BYOD Marketing Managed IT Services Search Data Recovery Users Internet of Things Ransomware Employer-Employee Relationship Data Security Tablet Remote Computing Wearable Technology The Internet of Things Apple Facebook Vendor Management WiFi Bring Your Own Device Avoiding Downtime iPhone Risk Management Money Cost Management IT Support Hacking Maintenance Saving Time Router Phishing Wireless Technology BDR History User Error Mobility Remote Monitoring Antivirus Unified Threat Management Automation Hard Drives Office Tips Password Cloud Computing IT Solutions Tech Support Big Data Data Management Computers Encryption Social Telephone Systems Customer Relationship Management OneNote Government Bandwidth Current Events Phone System Wireless Information VPN Humor Two-factor Authentication Website Update Unsupported Software Net Neutrality Wi-Fi Printer Social Networking Vulnerability Shortcut Outlook Gmail USB Google Drive PowerPoint Networking Analytics Artificial Intelligence Proactive IT Firewall Lithium-ion battery Budget Recovery Laptop Augmented Reality Content Filtering Identity Theft Managed IT Services IT COnsultant Work/Life Balance Education Television Retail Excel Computer Repair Mobile Device Politics Meetings Travel Virus administration Social Engineering Applications Streaming Media Disaster Managed IT Trending Audit Entertainment Personal Information Intranet Blockchain Automobile Cleaning SaaS Value Point of Sale Save Time Data Protection Printer Server HaaS Computer Care Word Google Assistant Conferencing IT Management Programming Managing Stress hacker Twitter Storage Display Managed Service Devices Legal Amazon Transportation Paperless Office Patch Management End of Support Commerce Hosted Solution Flexibility Fax Server Business Intelligence Fraud Telephony Google Docs Customer Service Computing Biometrics Scam Uninterrupted Power Supply Sales Business Technology Hard Drive Data Storage Private Cloud Virtual Reality Wireless Charging HIPAA Access Control Mobile Security Internet Exlporer WannaCry Data Breach Human Resources Project Management DDoS Touchscreen Cortana Instant Messaging Emails Hybrid Cloud Evernote Samsung Online Currency Sports Battery Windows 8 Benefits eWaste Computer Accessories Community Chromebook Files IT solutions Comparison ISP Alexa for Business Root Cause Analysis Updates Branding HBO Identities Security Cameras Company Culture NFL Intrantet Mouse Co-Managed Services Printing Chromecast Windows 10s Specifications WIndows 7 Reputation Lifestyle Blogging Tutorial Microsoft Word Language Machine Learning Network Congestion Telephone Administrator Solid State Drive Worker Commute Regulations Keyboard Software as a Service Settings Device Security Bluetooth Downtime Windows Ink Video Games junk Hyperlink Access Co-managed IT Computer Forensics Hard Disk Drive Gifts Cameras Hiring/Firing WIndows Server 2008 User SharePoint Proactive E-Commerce Google Maps filter Wasting Time Nokia Management Credit Cards Virtual Desktop Presentation Smart Technology OneDrive Best Available Gift Giving Print Server Vendor Spyware Teamwork Websites Payment Cards Data Loss Science Youtube Accessory Robot Wireless Internet FAQ Sync Advertising Ebay Microblogging Employee-Employer Relationship Data Theft Employee Scalability Peripheral Data storage Gamification iOS Charger Buisness Experience PDF Edge Running Cable App store Break/Fix Upgrades Microsoft Excel How To Memory Computer Fan Music Near Field Communication Employer Employee Relationship Adobe Text Messaging Webinar Testing Images Screen Mirroring Ciminal Medical IT Consultant File Sharing 3D Printing Touchpad Surge Protector Financial Books IT consulting Camera Cast Admin Identity Black Market Monitors Electronic Medical Records Reliable Computing Licensing Compliance Debate Projects Help Desk IT budget Keyboard Shortcuts Distributed Denial of Service Data Privacy Webinar Legislation Bloatware Operating Sysytem Virtual Assistant Nanotechnology Workers Safety Payroll Training Tablets Inbound Marketing Windows 7