Welcome to Jordan IT Services, Gloucester
We have been in the IT Industry since 1999 and have a wide knowledge of Windows, Linux, Mac and Android operating systems.
We provide a full comprehensive range of IT solutions, services and supplies for “Home Users” and “Businesses”
We have designed networks and built large bespoke CAD computers for engineering companies amongst many other projects and supported many companies over the years.
IT supplies, repairs, development, networking and support make up our core areas.
“The pace of technological innovation demands that businesses of all sizes need to be up to date to survive – a key strategy for the successful businesses in most sectors is correct investment in and utilisation of technology.
To get these decisions right you need the best advice available”
Jordan IT Blog / IT News / Reviews
MICROSOFT EDGE to receive independent updates from WINDOWS 10 Online report indicates that Microsoft Edge will begin to receive feature updates through the Windows Store this autumn in a move to save the browser from shrinking share prices. On Monday, Rich Woods of...read more
Our Sci-Fi Future, Silly vs Terrifying The future is upon us! Modern technological developments are now strikingly similar to the science fiction of the past. While we aren’t living in domed cities with flying cars, we’ve got buildings that reach for the heavens,...read more
By analysing the movement of a device as the keyboard was used, Cyber Experts at Newcastle University say they were able to reveal just how easy it is for malicious websites and apps to spy on users using the motion sensors in smartphones and tablets. The team were...read more
What is a VPNs & Top VPNs 2017 What is a VPN? If you're concerned about online privacy and want to spies away, a virtual private network (VPN) is what you require.. We round up the best VPN services for you to protect your location and allowing you to access...read more
The term Cloud computing is the delivery of hosted services and applications over the internet. Cloud computing enables people and businesses to use a computer resource, such as storage or an application, without having to build and maintain computing infrastructures...read more
Fifth Generation - 5G is on its way.... Most phones on the market are running 3G and 4G. The 5G wireless network is expected to roll out in early 2020, and an increasing number of businesses are already investing to prepare for the new mobile wireless network. 5G...read more
Choose your passwords carefully... According to recent report by Verizon which you can read here , the biggest issue regarding data security is your choice of password and the steps you take to protect it. With "63% of confirmed data breaches involved weak, default...read more
SD Cards Universally used across a spectrum of digital hardware buying the right SD card can be confusing. The three main considerations when purchasing are: A) Which Size? Well you will of course need to check your device but basically there are three physical sizes....read more
Phishing Understanding Phishing and the need for Cyber Essentials Russian high-tech crime investigating company Group-IB have recently reported that cyber criminals have stolen £18.7 million from banks in Russia between August 2015 and February 2016 using spear...read more