SouthTech Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_twenty_first_century_computing_400.jpgPeople in 1967 were fascinated with new technology. During this era, technology advanced so quickly in such a short amount of time that people looked in wonderment at the future and made wild predictions at what the 2000s would look like. How accurate were the predictions of the 1960's scientific community? Let's check in with Walter Cronkite to find out!

Last modified on

b2ap3_thumbnail_old_tech_signs_400.jpgWhen we think of technology in terms of age, we often look at how long the machine has lasted for. Some machines from the mid-90's are still running, which makes them almost twenty years old. In terms of human life, that's not a very long time, but if you look at it in terms of quality working conditions, you'll find that these computers are kind of like dogs and cats. They may only be several years old, but in terms of actual age, their lifespan makes them much older than you realize.

Last modified on

b2ap3_thumbnail_dual_monitors_400.jpgWhen life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking up multiple monitors. With too many windows open, your desktop becomes cluttered and your workflow impeded. Stop getting lost in your work and hook up an extra screen today!

Last modified on

b2ap3_thumbnail_heartbleed_fallout_400.jpgLast week, the Heartbleed bug was identified as a weakness in the OpenSSL cryptographic library, potentially leaking two-thirds of the Internet's secure information from any websites utilizing this encryption style. While most major websites such as Google, Yahoo, and Facebook released patches quickly, it does little to actually remediate the problem. Your data could have been leaked over the year-plus that the vulnerability could have been accessed. There is no way to know if it has been compromised.

Last modified on

b2ap3_thumbnail_multitask_400.jpgYou may think that you're awesome at multitasking, but according to cognitive psychologist Art Markman, "You are your own worst judge of how good a multitasker you are." This is because the same areas of your brain that monitor performance are the same areas activated by multitasking, which means that it's difficult to accurately evaluate your own performance.

Last modified on

Follow us on:

facebook  youtube  linkedin  twitter   google+

Blog Categories

Blog Tag Cloud

User Error IT Support Trending Network Browser Passwords Antivirus Sports Bluetooth Application Co-managed IT Mobile Computing Innovation Firewall Backup Saving Money Computer Scam Tech Support Webcam Google Communication eBay Congratulations IT Solutions IT Consultant Phone Systems Piracy Touchscreen Inbound Marketing Conferencing Managed Service Provider Holiday Best Practice Remote Monitoring IBM Social Networking Apps Business Intelligence Mobile Devices Wireless Technology Best Practices Hacker Saving Time File Sharing Vendor Management Information Technology Email Health Mobile Device Management Windows 8 The Internet of Things Apple App WiFi Facebook Productivity Computer Accessories Excel Business Management Microsoft Microsoft Office Wearable Technology Display Macro Software Going Green Content Filtering Point of Sale 3D Users Disaster Recovery Lithium-ion Battery Hosted Solutions Business Continuity Windows Thank You Help Desk Android Smartphones Fax Server Virtualization Digital Payment Social Media VPN Maintenance Spam Customer Relationship Management Webinar Twitter Bring Your Own Device Current Events Upgrade PowerPoint Deltek Hardware Operating System Mouse Leadership IT Services Scheduling Avoiding Downtime Security Cloud Law Firm IT Hard Drives Alerts Phone System Mobile Office History Humor Computer Repair Social Privacy Internet Server BYOD Analytics Text Messaging Virus Quick Tips iPhone Unified Threat Management VoIP Data PC Care Streaming Media Smartphone Miscellaneous Marketing Printer Technology Gaming Console User Tips Remote Computing Workplace Tips Mobile Efficiency Augmented Reality Business Computing Small Business

Blog Archive