(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

b2ap3_thumbnail_ibm_processor_400.jpgIn July, IBM announced the development of a computer chip that’s four times more powerful than anything currently on the market. As cool as this news is, what makes it extra exciting is the fact that it’s an ultra-dense chip. Developments like this will be the driving force behind the advancement of computing, well into the next decade and beyond.

Tagged in: Computer IBM Processors
Continue reading 0 Comments

Tip of the Week: 6 of the Most Useful Cortana Commands

Posted by on in How-To

b2ap3_thumbnail_cortana_for_windows_400.jpgWho is Cortana? Windows 10 users all over the world are finding this out as they turn to Microsoft’s newest personal assistant with their important questions. One thing we know for sure about Cortana is that she can do a lot more than just search Bing. Here are six useful things you can have Cortana do for you.

Continue reading 0 Comments

b2ap3_thumbnail_cyberwar_400_20150827-185354_1.jpgModern society has become fully reliant upon technology. While technology has certainly done much to improve just about every facet of our lives, it also leaves us quite vulnerable to a scenario where we abruptly lose it. What would a worst-case scenario like this actually look like?

Continue reading 0 Comments

b2ap3_thumbnail_fbi_warns_ddos_400.jpgDo you know anyone affected by recent ransomware activity? The tragedy of Cryptolocker/Cryptowall, where files are locked down and returned in exchange for a ransom fee, might still be fresh in your minds. Well, the FBI warns that the end of cyber extortion is still far off, and that the next hacking technique that will be used is likely the DDoS attack.

Tagged in: DDoS Hacking Security
Continue reading 0 Comments

b2ap3_thumbnail_drag_and_drop_search_400.jpgOne of the greatest parts of the Internet is how easy it is to search for new information on a particular subject you’re unfamiliar with. Usually this is done by utilizing a search engine like Google, but the search giant’s web browser, Google Chrome, makes this way easier by providing built-in search functions into the browser, including a super-simple drag and drop search function.

Continue reading 0 Comments

Tag Cloud

Net Neutrality Recycling Comparison Cortana Remote Computing Webinar Co-Managed IT Statistics Online currency Mobile Device Productivity Presentation Hacker Mobile Device Management Marketing Software Teamwork Saving Money Gmail Harddrive LinkedIn IT Services Debate Maintenance Users Best Available Email External Harddrive Data Firewall Specifications Inbound Marketing Employer-Employee Relationship Social Networking Collaboration Business Continuity Android Saving Time Intranet Retail Help Desk Budget USB Processors Text Messaging Technology Search Electronic Payment Proactive IT Managed Service Provider Mobile Office Hardware User Efficiency Operating Systerm Wearable Technology Save Time Security Best Practices Cloud Gadgets Turn Key Smartphone Communication Microsoft Operating System Laptop User Error Touchscreen Virtualization Passwords Router Wireless Technology Display Windows 8 Trending Small Business Microsoft Office Thin Client Excel Facebook Network Congestion Information Technology Domains Business Computing Video Surveillance GPS Office History IT Support Virtual Desktop VoIP Holiday Social Business Owner Thank You Lifestyle Hosted Solutions Read Server Troubleshooting Content Management Avoiding Downtime Printer Server Unified Threat Management Innovation Safety Bring Your Own Device Entertainment IT Consultant Webcam File Sharing Virus Education Office 365 Smartphones Pirating Information Document Management Adroid Best Practice Human Resources 3D Hacking Lithium-ion Battery Hard Drives Save Money Heating/Cooling Browser Outlook Administration Programming Going Green Word VPN Windows 10 Documents Upgrade Privacy Humor Apple Augmented Reality Vendor Management Digital Payment Miscellaneous Hiring/Firing Digital Signature Chrome Business Intelligence IBM Customer Relationship Management PDF Google organize Cost Management HIPAA Phishing Archive Website Password Mobile Devices DDoS Bluetooth Cybercrime Spam IP Address Antivirus Hackers Computer Accessories Business WiFi Entrepreneur Computer Repair Gaming Console Competition BYOD Skype Quick Tips Downtime eWaste Update Computers Current Events Internet Malware Computer Congratulations App Risk Management Application Business Management Disaster Recovery Automation Microserver Riske Management Smart Phones Storage Printer Value Efeciency iPhone PowerPoint Shortcut BDR Mouse Running Cable Network Adminstration Remote Monitoring Content Filtering Backup Recovery Comanaged IT Alert Fax Server Data Management Big data Windows Tablet Company Culture Two-factor Authentication Public Speaking communications User Tips Apps Tip of the Week Leadership Environment Money Phone System Streaming Media The Internet of Things Customer Service Tech Support Workplace Tips Pain Points Health Point of Sale Analytics Government Sports Ebay Mobile Computing Social Media Analytic Tutorials Keyboard

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive