Give us a call

Ferrum Technology Services Blog

Ferrum Technology Services has been serving the Elgin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Society That’s Fully Dependent Upon Technology is Set Up for an Epic Fall

b2ap3_thumbnail_cyberwar_400_20150827-185354_1.jpgModern society has become fully reliant upon technology. While technology has certainly done much to improve just about every facet of our lives, it also leaves us quite vulnerable to a scenario where we abruptly lose it. What would a worst-case scenario like this actually look like?

0 Comments

How Website URLs Work

b2ap3_thumbnail_domain_information_400.jpgWhen it comes to your online presence, few tools are more valuable than your organization’s website. However, in order to have a website, you first need a domain name. There are countless domains available, but did you know that the meaning of these names has changed significantly over the past several years?

0 Comments

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpgIt turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

0 Comments

Tip of the Week: Protect Your Network By Blacklisting Malicious IP Addresses

b2ap3_thumbnail_know_your_ip_400.jpgLike your fingerprint, your computer’s IP address holds the key to your identity. Okay, it may not be as unique as your fingerprint, and you may actually use multiple IP addresses every day, but still, your IP address says a lot about you. What do you need to know about your IP address?

0 Comments

Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_wifi_hotspot_virtual_router_400.jpgDo you need a WiFi signal? If you’ve got a PC with a wireless card, then you’ve got what it takes to download Connectify and turn your PC into a WiFi hotspot. These days, with everyone being so dependent on WiFi, having an additional WiFi hotspot can come in handy.

0 Comments

Tip of the Week: How to Deal with Internet Trolls

b2ap3_thumbnail_issues_with_internet_trolls_400.jpgLet’s face it: The Internet is filled with opinions, and several of them are undoubtedly wrong. Generally, most mature people will take these opinions with a grain of salt and move on. The other half of the population absolutely must respond. These responses are often less-than-friendly, and some of them are just trying to anger the original poster. We call these people Internet trolls.

0 Comments

Tip of the Week: 3 Ways to Monitor Your Employee’s Internet Usage

b2ap3_thumbnail_your_query_is_blocked_400.jpgThe Internet is a vast and wonderful plain of many fruits and resources, but there are two sides to everything. It can also be a vile and disgusting place, with content that could make even the most hardened criminal flinch (or stare in astonishment). Keep your network safe by implementing a content filtering solution for your business.

0 Comments

Upon Further Review, the FCC Reverses its NFL Blackout Rule; Fans of Net Neutrality React

b2ap3_thumbnail_nfl_fcc_400.jpgIt's football season! Many NFL fans are spending their Sundays glued to their TV sets cheering on their favorite team. This season, those in the tech industry who are concerned about net neutrality have also taken an interest in football--primarily due to a recent FCC ruling.

0 Comments

How One Business Owner is Fighting Yelp in the Most Unconventional Way Possible

b2ap3_thumbnail_are_review_sites_good_400.jpgOne California restaurant owner has recently taken on an interesting marketing strategy that goes against all conventional wisdom. Co-owner David Cerretini of the Italian restaurant Botto Bistro tells his strategy to USA Today, "I want to be the worst restaurant in the San Francisco area!" Strangely enough, his approach seems to be working.

0 Comments

What a Software Licensing Nightmare Scenario Looks Like

b2ap3_thumbnail_licensed_software_400.jpgWhat's the licensing status of your company's software look like? If you've not been intentional about this, then your business may be using several unlicensed applications. You may be thinking, "Everything works fine. No big deal." Sure, it's no big deal--until you're caught!

0 Comments

Europe’s Great Debate: The Right to Be Forgotten

b2ap3_thumbnail_do_you_have_the_right_to_be_forgotten_400.jpgOne of the hot topics in recent news is a concept in European courts about the "right to be forgotten." The ruling, passed in May 2014, suggests that search engines must consider requests for removal of content that is, according to ZDNet, "inadequate, irrelevant, or no longer relevant." In some circles, this ruling is seen as controversial.

0 Comments

The Challenges of Keeping Up with Big Data

b2ap3_thumbnail_control_big_data_400.jpgWe're living smack dab in the middle of the data age. In fact, 90% of the world's data was generated last year. New devices and systems create crazy amounts of data, and every byte must be processed, stored, and catalogued in such a way that it can be easily retrieved from any device, anywhere. The IT industry refers to this as "Big Data," and how your business manages its data will determine your success in this new age.

0 Comments

VoIP and Voice: What You Need To Know

Digium SwitchVox

VoIP stands for Voice over Internet Protocol. Essentially what it does is convert audio phone signals that are normally broadcast in analog format to digital data, which can then be sent over the Internet. I know - that was greek right?  Let me try to explain.

0 Comments

What is the Future for Net Neutrality?

b2ap3_thumbnail_net_neutrality_no_monopoly_400.jpgThe issue of net neutrality is a hot topic in the United States, but not many people actually know what it is and how it affects their day-to-day routine. This is certainly an important topic that shouldn't be ignored, as it might very well affect all end users.

0 Comments

Eugene Goostman Program Supposedly Passes Turing Test

b2ap3_thumbnail_will_there_be_ai_400.jpgArtificial intelligence might not be a thing yet, but according to the results of a recent Turing test, it might very well be on its way toward becoming reality. A Russian team has put together a computer program named Eugene Goostman that may (or may not) be the first program to pass a Turing test.

0 Comments

Dogecoin Hacked! Such Loss.

b2ap3_thumbnail_docecoin_wow_400.jpgDoge, the Internet meme of a grammatically-challenged Shiba Inu dog that prefers comic sans, is so popular that it has its own online currency called Dogecoin. The fact that Dogecoin exists may be news to you, but it's also news that Dogecoin is temporarily stopping its service after its database (the Doge Vault) was hacked.

0 Comments

Shouldn’t Everybody Be on the Internet? Yes!

b2ap3_thumbnail_everyone_business_internet_400.jpgAlmost 20 years ago, a class of fifth grade students from Helena, Montana produced a PSA video about the future-changing possibilities of the Internet. When this PSA was shot in 1995, only 0.4% of the world's current population (16 million people) used the Internet. Now, almost 39% of the world is online, making this video scary accurate!

0 Comments

What’s an Internet-Addicted Person to Do?

b2ap3_thumbnail_surfing_at_work_400.jpgSometimes it's okay to waste time surfing the Internet, like when you're unwinding at home after a long day at the office. However, wasting time with mindless Internet browsing can become a problem when it cuts into your work day and makes you less productive.

0 Comments

Where Did Internet Spam Come From?

b2ap3_thumbnail_spammy400.jpgSpam in your email inbox is extremely annoying. Email spam is always an eyesore, and swallows up valuable time wasted on sifting through your inbox. Have you ever wondered how email spam got its name? You may be surprised to find the answer. Here's a hint: it has something to do with Vikings, a diner, canned meat, and a British comedy.

0 Comments

Protect Your Critical Data with VPN

b2ap3_thumbnail_vpnet400.jpgWhen getting work done on the Internet, users are faced with a slew of threats that could hack sensitive company and personal data. Integrating a VPN solution may be your best option in securing your company network and files from online attacks. What is VPN, and why should your company be using it?

0 Comments

Blog Archive

2024
May
June
July
August
September
October
November
December
2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code