SouthTech Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_twenty_first_century_computing_400.jpgPeople in 1967 were fascinated with new technology. During this era, technology advanced so quickly in such a short amount of time that people looked in wonderment at the future and made wild predictions at what the 2000s would look like. How accurate were the predictions of the 1960's scientific community? Let's check in with Walter Cronkite to find out!

Last modified on

b2ap3_thumbnail_old_tech_signs_400.jpgWhen we think of technology in terms of age, we often look at how long the machine has lasted for. Some machines from the mid-90's are still running, which makes them almost twenty years old. In terms of human life, that's not a very long time, but if you look at it in terms of quality working conditions, you'll find that these computers are kind of like dogs and cats. They may only be several years old, but in terms of actual age, their lifespan makes them much older than you realize.

Last modified on

b2ap3_thumbnail_dual_monitors_400.jpgWhen life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking up multiple monitors. With too many windows open, your desktop becomes cluttered and your workflow impeded. Stop getting lost in your work and hook up an extra screen today!

Last modified on

b2ap3_thumbnail_heartbleed_fallout_400.jpgLast week, the Heartbleed bug was identified as a weakness in the OpenSSL cryptographic library, potentially leaking two-thirds of the Internet's secure information from any websites utilizing this encryption style. While most major websites such as Google, Yahoo, and Facebook released patches quickly, it does little to actually remediate the problem. Your data could have been leaked over the year-plus that the vulnerability could have been accessed. There is no way to know if it has been compromised.

Last modified on

b2ap3_thumbnail_multitask_400.jpgYou may think that you're awesome at multitasking, but according to cognitive psychologist Art Markman, "You are your own worst judge of how good a multitasker you are." This is because the same areas of your brain that monitor performance are the same areas activated by multitasking, which means that it's difficult to accurately evaluate your own performance.

Last modified on

Follow us on:

facebook  youtube  linkedin  twitter   google+

Blog Categories

Blog Tag Cloud

IBM Humor Deltek Social Excel Productivity Holiday Thank You Application VoIP Tech Support Analytics Email Microsoft Quick Tips Browser History Going Green Windows 8 IT Solutions Mobile Device Management Maintenance Internet Lithium-ion Battery Touchscreen IT Consultant Users Remote Computing Phone System Health Digital Payment Business Intelligence Firewall Business Management Efficiency Passwords Server Operating System The Internet of Things Business Continuity Printer Best Practice Facebook Workplace Tips Scheduling Point of Sale Inbound Marketing Remote Monitoring Microsoft Office Augmented Reality WiFi Vendor Management Macro eBay Backup Apps Marketing Social Networking Spam Smartphones Piracy User Error Trending Windows Apple IT Services Business Computing Avoiding Downtime Twitter Webcam Bring Your Own Device Disaster Recovery Fax Server Current Events Leadership Content Filtering Webinar Mobile Office Co-managed IT Best Practices Congratulations Data Hard Drives Virtualization Sports Computer Accessories 3D Managed Service Provider Scam Cloud Gaming Console Phone Systems Wireless Technology BYOD Social Media Saving Money Hosted Solutions Wearable Technology Display Computer Repair Privacy File Sharing Virus Antivirus Miscellaneous Google Alerts Android Mouse Saving Time Hardware Text Messaging Mobile Devices PC Care Network Mobile Conferencing PowerPoint Innovation iPhone IT Support App Information Technology Help Desk Computer Software Streaming Media Small Business Security Bluetooth Law Firm IT Upgrade Technology Mobile Computing User Tips Customer Relationship Management Unified Threat Management VPN Smartphone Hacker Communication

Blog Archive