• 24/7 IT Support - American Help Desk and Tech Support
  • Preventive IT Maintenance - 24/7 Computer Support
  • Outsource your IT Support

Sovran Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_ibm_processor_400.jpgIn July, IBM announced the development of a computer chip that’s four times more powerful than anything currently on the market. As cool as this news is, what makes it extra exciting is the fact that it’s an ultra-dense chip. Developments like this will be the driving force behind the advancement of computing, well into the next decade and beyond.

Tagged in: Computer IBM Processors
Last modified on

Tip of the Week: 6 of the Most Useful Cortana Commands

Posted on in How To

b2ap3_thumbnail_cortana_for_windows_400.jpgWho is Cortana? Windows 10 users all over the world are finding this out as they turn to Microsoft’s newest personal assistant with their important questions. One thing we know for sure about Cortana is that she can do a lot more than just search Bing. Here are six useful things you can have Cortana do for you.

Last modified on

b2ap3_thumbnail_cyberwar_400_20150827-185354_1.jpgModern society has become fully reliant upon technology. While technology has certainly done much to improve just about every facet of our lives, it also leaves us quite vulnerable to a scenario where we abruptly lose it. What would a worst-case scenario like this actually look like?

Last modified on

FBI Issues Warning About the Rise in DDoS Attacks

Posted on in Alerts

b2ap3_thumbnail_fbi_warns_ddos_400.jpgDo you know anyone affected by recent ransomware activity? The tragedy of Cryptolocker/Cryptowall, where files are locked down and returned in exchange for a ransom fee, might still be fresh in your minds. Well, the FBI warns that the end of cyber extortion is still far off, and that the next hacking technique that will be used is likely the DDoS attack.

Tagged in: DDoS Hacking Security
Last modified on

b2ap3_thumbnail_drag_and_drop_search_400.jpgOne of the greatest parts of the Internet is how easy it is to search for new information on a particular subject you’re unfamiliar with. Usually this is done by utilizing a search engine like Google, but the search giant’s web browser, Google Chrome, makes this way easier by providing built-in search functions into the browser, including a super-simple drag and drop search function.

Last modified on

Sign Up for Our Newsletter

*Email
*First Name
*Last Name

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Thanks for sharing why you should care about IP addresses and how to protect your network. Great pos...
Brent, very interesting use for Big Data. Many uses of big data have a measurable positive impact o...
Back to Top