SouthTech Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_dual_monitors_400.jpgWhen life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking up multiple monitors. With too many windows open, your desktop becomes cluttered and your workflow impeded. Stop getting lost in your work and hook up an extra screen today!

Last modified on

b2ap3_thumbnail_heartbleed_fallout_400.jpgLast week, the Heartbleed bug was identified as a weakness in the OpenSSL cryptographic library, potentially leaking two-thirds of the Internet's secure information from any websites utilizing this encryption style. While most major websites such as Google, Yahoo, and Facebook released patches quickly, it does little to actually remediate the problem. Your data could have been leaked over the year-plus that the vulnerability could have been accessed. There is no way to know if it has been compromised.

Last modified on

b2ap3_thumbnail_multitask_400.jpgYou may think that you're awesome at multitasking, but according to cognitive psychologist Art Markman, "You are your own worst judge of how good a multitasker you are." This is because the same areas of your brain that monitor performance are the same areas activated by multitasking, which means that it's difficult to accurately evaluate your own performance.

Last modified on

b2ap3_thumbnail_bleeing_heart_one_400.jpgOn April 7th, a new bug on the Internet was discovered that's putting millions of users' personal data at risk. Given the name "Heartbleed bug," it's capable of allowing infiltrators to collect information while you are securely browsing a SSL/TLS website. Since SSL/TLS is so widely used, it's very probably that your personal data is at risk.

Last modified on

b2ap3_thumbnail_wearable_tech_all_the_rage_400.jpgWearable technology has dominated the tech headlines lately, and for good reason. The concept of having smart technology so easily accessible at any time is an attractive feature for many people. Some are patiently waiting for the public release of Google Glass later this year, along with many more attractive wearable technology options being released including Google's Android Wear.

Last modified on

Follow us on:

facebook  youtube  linkedin  twitter   google+

Blog Categories

Blog Tag Cloud

Deltek Best Practice Macro Business Intelligence Excel Microsoft Display User Error Marketing Text Messaging Remote Computing Security Business Computing eBay Workplace Tips Mobile Disaster Recovery Network Remote Monitoring Hosted Solutions Hardware Virtualization Android Lithium-ion Battery Email Health PC Care The Internet of Things Alerts Digital Payment Cloud Webinar IT Consultant Best Practices Firewall Mobile Computing Server Information Technology Apple Business Continuity Customer Relationship Management Humor Computer Webcam Mouse VPN WiFi Browser Sports Internet iPhone Backup Content Filtering Wearable Technology Communication Streaming Media Innovation Computer Accessories Microsoft Office Antivirus Social Upgrade Going Green Law Firm IT Vendor Management Help Desk Hard Drives Conferencing Users Business Management Touchscreen Windows 8 Scheduling Tech Support Unified Threat Management Facebook Small Business Application History IBM Quick Tips Social Networking Augmented Reality Current Events IT Solutions Co-managed IT Leadership Managed Service Provider Thank You Piracy Miscellaneous Software Scam Virus Point of Sale Efficiency Gaming Console Mobile Office Wireless Technology Saving Time Hacker Technology Operating System Smartphones Apps Saving Money Analytics App IT Services Bluetooth Avoiding Downtime Congratulations Passwords Smartphone Google Maintenance Inbound Marketing Trending IT Support VoIP Fax Server Phone System Social Media Productivity Mobile Device Management File Sharing PowerPoint User Tips Privacy 3D Holiday Twitter Windows BYOD Data Phone Systems Bring Your Own Device Printer Mobile Devices Spam Computer Repair

Blog Archive