Blog

Free Consultation

Your technology can be more reliable and productive. We will show you how.

Get started

How Does Google Work?

Searching the web with Google is a part of almost everyone's daily routine. It's easy to find any information you could want in just a few keystrokes. But have you ever wondered just how search engines like Google actually work?

Let's take a look at the inner workings of Google and see how it knows how to find what you're looking for so efficiently.

Megabytes, Gigabytes, and More: Computer File Sizes Explained

You probably see terms like "megabyte" and "gigabyte" used pretty often. They show up in everything from the amount of storage your phone has to your monthly data plan and more.

But how exactly do computers arrive as these figures? Let's take a look at how computers count numbers, the most common amounts of storage, and roughly what they equate to.

How to Integrate LinkedIn and Outlook

You likely work with many different people in your job. Whether it's the people you team up with every day, or new connections you form, keeping track of them is important.

Recently, Microsoft has added LinkedIn integration to Outlook in Office 365. This lets you see LinkedIn information about contacts new and old without visiting the website.

How to Start Using Microsoft Flow’s Automated Workflows

Most people use several online apps and services in the course of their day. Wouldn't it be great if we could connect these to make them work better together?

Microsoft Flow, a tool from Microsoft, allows you to do just that. Read on for an introduction to Microsoft Flow and how it lets you created link services in amazing ways.

How to Use the Microsoft Junk Email Reporting Add-in for Outlook

Junk email, or spam, is a frustrating part of modern email. Millions of junk messages are sent every day, so it's likely that you receive some in your inbox.

While Outlook and other email clients do a good job of blocking spam automatically, Microsoft also offers a great Outlook add-in for reporting junk email.

What Is the Difference Between Phishing and Junk Mail?

Since email is so prevalent, you've probably heard the terms junk mail and phishing before. While it might seem like these two terms refer to the same type of email, this isn't the case.

Let's take a look at the differences between phishing and junk mail, and what this means for you.

How to Use the Houk Consulting Autotask Client Portal

Wondering how many IT support tickets your company has open? Want to check the status of a ticket you submitted recently? You can do all this and more with the Houk Consulting client portal.

This ties in with Autotask, our ticketing system, and lets you get a better picture of what's going on with various tickets.

How UAC Helps to Protect Your Computer

When you try to install software or make certain changes on your computer, you might see a window like this:

This is from the UAC (User Account Control) feature on Windows. Let's take a look at what UAC is and why it's important to keep enabled.
What Is UAC?
UAC is a security feature first introduced in Windows Vista.

Introducing New and Improved Monthly Reports

Houk Consulting clients receive a report at the start of each month that details crucial information about your IT infrastructure. We're excited to announce that we've recently revamped these reports to make them even better for you.

In addition to a cleaner visual look, the new reports from N-Central have some other benefits.