888.546.4384|607.433.2200

 

livechat icon

Live Chat Support

Live Online Meeting

WEB DESIGN SERVICES

CREATE ACCOUNT

*

*

*

*

*

*

FORGOT YOUR PASSWORD?

*

Don’t wait any longer. Get started today!

 
 

Tech Minutes

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

World Backup Day Highlights the Importance of Backup Practices

World Backup Day Highlights the Importance of Backup Practices

March 31, 2018 is World Backup Day. Data is a commodity, but unlike other commodities--it can be replicated without hurting its value. As a result, data backup has become a critical need for the modern business. World Backup Day has been created to remind people to protect their assets by backing up their files.

0 Comments
Continue reading

Leveraging Content Marketing in a B2B Strategy

When engaging in business-to-business marketing, your content plays a huge role in your success. Whether you’re creating social media content, blogging, creating articles for your web pages, creating newsletter content, or even working an in-person event, you need to make sure your content is effectively benefitting your marketing.

We’re here to help, so we’ve compiled some key considerations to make as you shape your content marketing strategy through each of the above tactics.

Continue reading

CPT: We Struck Gold With Our St. Paddy’s Crock-Pot Thursday!

Saint Paddy's Day

On a day where everybody is Irish, of course we are going to have corned beef, cabbage and potatoes. However, this braised brisket recipe is sure to make you green with envy! Our dessert was mint chocolate chip cookies that were as green as the Emerald Isle! A feast this plentiful, was sure to have made St. Patrick proud. Sláinte, in other words "Cheers!”

Try your luck with the recipes below!

Continue reading
Featured

“Due Diligence,” what does it mean to you?

Due_Diligence

dil-i-gence (diləjəns) - 1. careful and persistent work or effort.

0 Comments
Continue reading

Another Easy Chicken Meal, But We Are NOT Complaining!

unnamed

Do you ever decide what to cook based on how many dishes you will dirty in the process?...Well here is your new favorite meal. It not only tastes great, but you only need to dirty one pan, or in Directive’s case, 4 pans! We could not get enough of today’s Crock-Pot Thursday meal, Pepper Jack Chicken and Stuffing.

To try it out yourself with the recipe below!

0 Comments
Continue reading

Preventing Productivity Loss After a Natural Disaster

square_offline_566

Considering the recent weather events in the Southern United States, it only seems prudent to address a few considerations that may not be the first to come to mind when making business arrangements for such occurrences. For instance, what are the expectations that employees are held to in the case of a weather disaster?

0 Comments
Continue reading

Giving Thanks, Techie Style!

CC1_fall_water_400

For the last several years, we have annually asked the members of our team what they were grateful for. It doesn’t have to be a major thing, just some way that technology has improved our everyday lives. After a few silly answers, like memory foam (which is great) and forks (also important technology), they ended up coming up a few great technologies that they are thankful for. Here’s a few stand out items that we wanted to highlight:

0 Comments
Continue reading

Fun With Fall Foods and a Little Bit of Philly

DSC01016

 Fall is always a great time for cooking, especially in Upstate, NY. Today was a perfect cool day to open up the oven and try a new fall dish. So, for today’s Crock-Pot Thursday we tried; Philly Cheese Steak Bake, Tangy Broccoli Salad, Lemon Butter Roasted Asparagus, and finished off with Lemon Bar Cupcakes. Yum is an understatement. Want to try this meal out for yourself? Check out the recipes below!

0 Comments
Continue reading

Selecting the Best Software as a Service For Your Business

Fotolia_116548418_XS

Small and medium-sized businesses have increasingly turned to SaaS, or Software as a Service, to access the tools and resources they need to complete their objectives. Rather than maintaining a solution in-house, SaaS is delivered as a web application or through the cloud. However, not all SaaS solutions deliver the same functionality.

0 Comments
Continue reading

What is a Kebab? [Video]

food

Summer isn’t over yet! Today’s Crock-Pot combined a summer favorite, shish kebabs, and a team favorite, fajitas, with: Fajita Shish Kebabs, and Cherry Turnovers for dessert! Watch as our team gives their own unique definition for shish kebabs in today’s video!

 

Try them for yourself with the recipes below!

 

0 Comments
Continue reading

How To Keep Your IT Technicians From Having A Bad Time

Fotolia_44879410_XS

If you have an in-house IT specialist, they are very likely the unsung hero of the office. Working behind the scenes to ensure the solutions you rely on are functioning, their efforts also enable you to improve and drive your business forward. However, many technicians can find themselves fighting an uphill battle against overload.

0 Comments
Continue reading

Why Video Landing Pages are a No-Brainer

Video-landing-page-Fotolia_135437156_S

Video can be leveraged to great effect in a wide variety of places, especially on landing pages. In fact, videos have been shown to increase conversions by 86% when used on landing pages. We’ll go over some of the benefits of including videos on your landing pages, and some tips to make these videos even more effective.

0 Comments
Continue reading

CPT Presents: National Chili-Dog Day! [Video]

chilidogday

 Happy National Chili-Dog Day! How lucky are we that such a great holiday fell directly on a Crock-Pot Thursday? Today you’ll watch the techniques of two of our team members in a.....drumroll please........hot dog eating contest! Who will win? Kathy Chupp or Jimmy Mustard? Watch the video to find out!

0 Comments
Continue reading

Run a Small Business? Here’s Why You Need an IT Consultant

Expert-Advice--Fotolia_107313597_S-square

The concept of deferring to an expert is not new, especially in terms of running a business. If your business encounters a problem in its plumbing, you call in a plumber. When it comes to your business’ IT solutions, there are professionals who can help with issues there as well: IT consultants.

0 Comments
Continue reading

Where We Stand: 2017’s Cybersecurity in Review (So Far)

Fotolia_45749667_L

After a year like 2016, it should come as no surprise that 2017 has been a year of significant cyber threats. Looking back on the events of the year so far may help us to anticipate what kind of threats we can anticipate in the second half of 2017.

0 Comments
Continue reading

What is Server Management, and How Will It Help Your Business?

4SjuA7R

Your server is an integral part of your IT setup, which means that it is all the more crucial that it is managed properly. As the central hub of your network, it connects all of the devices that you rely on to each other, allowing them to interact and communicate. Under proper server management practices, your server will be more able to accomplish this task.

In order to better understand how to properly approach server management, it helps to look at it not as an entire process, but to break it into its two parts.

0 Comments
Continue reading

The Causes of Network Crashes (and How to Avoid Them)

Fotolia_119529595_XS

It should come as no surprise that a crash occurring in your computer network is a bad thing for your business. However, the real ramifications of such an event might not immediately come to mind. Fortunately, there are precautions that may be put into place that can help you to mitigate the chances of a network crash.

0 Comments
Continue reading

Chipotle Feeling the Heat After Upstate New York Restaurants Breached

Cancelled-Credit-Card

Patrons of Chipotle Mexican Grill might soon start to feel sick to their stomach, but it will have nothing to do with the food--the company has disclosed the full list of upstate New York restaurants affected by the point-of-sale malware that infected the company between March 24th and April 18th of this year. Could this breach have compromised one of your cards? Could you be vulnerable in some other ways, too?

0 Comments
Continue reading

Okay.. We Might Have Fibbed a Little

408258396590099834-account_id2_edited

 On behalf of everyone here at Directive, we wanted to acknowledge the video that was released a few weeks ago that claims we grow our Crock-Pot Thursday meals in what we said was our pizza orchard. These claims were not entirely accurate. See the video.

0 Comments
Continue reading

What is BDR?

Fotolia_143922446_XS

There’s a pretty good chance that you’ve seen us throw the term BDR around quite a bit, or reference what we have in place as far as a Backup and DIsaster Recovery solution is concerned. However, do you know what we’re really talking about when we toss out this industry jargon?

0 Comments
Continue reading

5 Steps to Take Before Going to a Computer Repair Shop

Fotolia 98669974 SUh oh, your PC or laptop is starting to act up again. If it’s been checked for software problems, you’re most likely dealing with an issue with the hardware. Looks like it's time for a trip to the repair shop--but before you go, you need to make a few preparations. Here are the five things you need to consider before taking your computer in for repair.

0 Comments
Continue reading

Central New York To Serve As Drone Test Playground

drone animatedIn November of 2016, Governor of New York Andrew Cuomo devoted $30 million dollars to a 50-mile-long flight traffic management system to promote the use of unmanned aircraft systems (more commonly known as drones) for Central New York business purposes. This ‘corridor,’ as it is called, will stretch from Griffiss Air Force Base in Rome to Syracuse by sometime in 2018.

0 Comments
Continue reading

How Well Do You Know Your Cyber Threats? Test Your Knowledge With Our Quiz

QuizThere are an unfortunate number of cyber threats out there; protecting your company’s network from these threats is paramount. In order to find out how acquainted you are with the malicious programs and attacks that could harm your business, we’ve devised this quick quiz to test your knowledge.

0 Comments
Continue reading

New York Will Soon Be The First State With Complete High-Speed Broadband Access

Fotolia 49306991 SDoing business in this day and age depends more and more on your ability to connect to the Internet. It is also essential that your connectivity speeds are able to keep up with your business needs. For many operating in New York State, this has been a problem, but no longer.

0 Comments
Continue reading

Is Spectrum-Time Warner Cable Ripping You Off? How to Make Sure You're Getting the Internet Speed You're Paying For

Fotolia 49622659 SIn February, the New York State Office of the Attorney General filed a lawsuit against Spectrum-Time Warner Cable and its parent company, Charter Communications, alleging that the company has been systematically defrauding customers since 2012 by promising and charging for Internet speeds that it knew it couldn’t offer. This case of fraud raises an important question, “How do you know if you’re really getting the Internet speed you’re paying for?”

0 Comments
Continue reading

Why SMBs Need Both Great Email Protection Software and Employee Awareness

Fotolia 32714707 SSmall businesses today have a lot more to worry about than they did twenty, or even ten years ago. Threats have grown so sophisticated that it can be difficult to gauge just how vulnerable your organization is to them. It’s especially important that your organization protects itself from the dangers that lurk within emails, tucked behind thinly-veiled schemes and honeyed words.

0 Comments
Continue reading

Investigating the Biggest Security Leaks and the Weaknesses They Exposed

Investigating the Biggest Security Leaks and the Weaknesses They Exposed

 Every year, we hear about a major corporation being hacked. No matter the size of the business, weak links can always be identified in a network’s security. Let’s investigate some of the biggest security leaks and how they could’ve been avoided. In one case, it was as easy as implementing two-factor authentication.

0 Comments
Continue reading

How to Choose the Right Hosting Provider for Your Data Needs

How to Choose the Right Hosting Provider for Your Data Needs

By now, you've heard about the many advantages of hosting your data and applications in the cloud. To take advantage of these money-saving benefits, you'll want to select the right cloud provider to host and manage your data. Otherwise, you may end up with poor support and disappointing service.

To help you pick the right hosting provider, you first need to familiarize yourself with your options. Here's a walkthrough of what you need to look for.

0 Comments
Continue reading

AT&T To Purchase Time Warner, Raising Flags with Regulators

AT&T To Purchase Time Warner, Raising Flags with Regulators

In a historically large media merge, AT&T and Time Warner have come to an agreement in a proposal that has been discussed since as early as August 2016. The wireless provider intends to purchase Time Warner’s media holdings for a whopping total of $85.4 billion in cash and stocks, assuming the merger passes the inspection of antitrust regulators.

0 Comments
Continue reading

A Beginner's Guide to Facebook Advertising - Determining Your Facebook Advertising Budget [4 of 7]

A Beginner's Guide to Facebook Advertising - Determining Your Facebook Advertising Budget [4 of 7]

Part 4 of 7 - Determining Your Facebook Advertising Budget [Series]

In the first part of this series, you may remember us discussing the affordability Facebook offers businesses. In fact, that is one of the many reasons Facebook advertising has become so successful. Any budget can be supported, but how far can your budget take you? 

0 Comments
Continue reading

A Beginner's Guide to Facebook Advertising - Creating an AD [3 of 7]

Part 3 of 7 - Creating an Ad [Series]

Facebook Ads have the ability to transform your company and dramatically increase your leads without destroying your budget. If you want to reach 1.55 billion Facebook users that could potentially turn into your clients, then Facebook Advertising is right for you. The following will tell you the preliminary steps you need to know to create a Facebook Advertisement of your very own! 

0 Comments
Continue reading

Debunking the Myths of Syndicated Content

Lately, I have come across articles from friends and peers that have discussed a topic and presented inaccuracies that I find troublesome. There is some confusion that syndicated content is never worthy of respect or consideration. This seems especially true when it is compared to custom content. However, this may not always be the case, and so there are a few points that need to be cleared up from the get-go. Considering that my company provides syndicated, custom, and SEO content, I am an authority uniquely positioned to clarify this matter, which is what I intend to do here.

0 Comments
Continue reading

How to recover your laptop from a nasty spill!

How to recover your laptop from a nasty spill!

Since the invention of laptops, “the workplace” has become a phrase that may describe many more places than the office your business is established in, as mobile computers encourage taking your productivity with you by their very nature. However, this “productivity anywhere” feature does not come without its dangers to the poor laptop.

0 Comments
Continue reading

Why Multi-Factor Authentication is Way Better Than Passwords

Why Multi-Factor Authentication is Way Better Than Passwords

Time hasn’t been kind to the password. It’s continuously put down as one of the least secure methods of protecting systems. It’s not due to any fault of the password, though. People just have a hard time remembering long and complex passwords. To aid in security, it’s recommended that you use some sort of multi-factor authentication. While some users prefer easy SMS message two-factor authentication, there are actually many different types of multi-factor authentication available.

0 Comments
Continue reading

A Fascinating Look at How the Internet Has Changed the Stock Market

b2ap3_thumbnail_the_internet_and_the_stock_market_400.jpgWhen you think about the stock market, one vibrant image that comes to mind is the chaotic trading floor of the New York Stock Exchange, with traders climbing over each other and barking orders. Today, the NYSE trading floor is much more subdued, a testimony to just how much technology has changed the financial marketplace.

0 Comments
Continue reading

The Fundamental Business IT Defense Plan

b2ap3_thumbnail_Fotolia_79901612_M2.jpgProperly maintained IT security is necessary for the modern business. If your business utilizes email, connects to the Internet, or has employees that use mobile devices like smartphones and tablets, you need to have solid IT security in place. The following covers a lot of common elements required to protect your data and reputation. Keep in mind, depending on your industry, there may be additional compliances and regulations you need to follow.

0 Comments
Continue reading

10 Questions to Ask Yourself When Reevaluating Your IT

b2ap3_thumbnail_Fotolia_57335383_M2.jpgAlthough successful business owners are often cut from different cloths, one factor that many share is constantly measuring and assessing everything involving your business. From the profitability of particular departments, to equipment lifecycles, to the various expenses your company pays each month, the key to sustainable growth is by understanding what works and what doesn’t.

0 Comments
Continue reading

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

zero trust 400When it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

0 Comments
Continue reading

How to Recognize a Champion IT Professional

b2ap3_thumbnail_technology_the_man_400.jpgWhen your business is in need of IT assistance, you want to make sure that you are getting the best of the best. However, the best course of action isn't to just look at someone's qualifications. You also want to look at their personality and other characteristics which can tell you a lot about who you are hiring.

0 Comments
Continue reading

Celebrate your Freedom from IT Burdens!

b2ap3_thumbnail_america_and_it_400.jpgEverybody loves their freedom, but for some, freedom is an illusion. Take for example the busy business owner. Often times, their work schedules are so packed with tasks that they don't feel free to take a break and enjoy themselves. Technically, they have the freedom to quit, but we think there's a better way to find freedom in the workplace!

0 Comments
Continue reading

Early Mornings Can Help Your Business!

b2ap3_thumbnail_early_bird_400.jpgEverything seems to be going your way for once. The office is really coming together to make that big business deal you've been trying so hard to get for months. You shake the CEO's hand and seal the deal. You stroll out of the office with a spring in your step and get in the taxi to head home for the night. But the cab driver is playing loud music - so loud that it just sounds like screeching in your ear. And then you wake up, your alarm clock ringing at max volume. It's 7:00am, and it's time to go back to the office that feels like a prison, and your employees the inmates.

0 Comments
Continue reading

Is a 13-Year-Old Boy from Odessa the First Turing-Tested AI Program Unit?

b2ap3_thumbnail_artificial_intelligence_400.jpgThe technology for artificial intelligence isn't quite there yet, but according to a recent Turing Test performed at the University of Reading, there might be some hope for it in the near future. A Russian team has assembled a computer program called Eugene Goostman who many believe is the first to pass the Turing Test.

0 Comments
Continue reading

Cooler Drives Won’t Prevail

b2ap3_thumbnail_cold_hard_drives_400.jpgEverybody knows operating a computer under cooler temperatures increases its performance. This is why some server closets feel like a walk-in refrigerator. One thing about computers that you may not have known is whether or not running a PC at cooler temperatures extends its life. Logically, one would assume yes, however, the research says otherwise.

0 Comments
Continue reading

Touch-Screen PCs: Hands-On Productivity or a Gimmick?

b2ap3_thumbnail_touch_screen_devices_400.jpgFor the past decade, touch-screens have changed the way that we as a society touch technology, and have greatly increased the mobility of business in that short time. This trend started with the smartphone, then spread to the 10-inch tablet and larger tablets - perfect for watching YouTube videos, Netflix, or other media consumption.

0 Comments
Continue reading

4 Google Glass Etiquette Tips

b2ap3_thumbnail_google_glass_etiquette_400.jpgWearable technology is still relatively new. While technologies like Google Glass have found enthusiastic users, in the eyes of the general public, the verdict is still out. The best thing a Google Glass user can do with their favorite new tech is to use it responsibly. Here's some tips on how to be a good AmGlassador!

0 Comments
Continue reading

The Joys of Server Migration

b2ap3_thumbnail_server_migration_400.jpgThere are times when a specific task is asked of a server requiring all of its data to be moved. When this happens, all the files and applications are transferred to another server unit in a fascinating procedure called server migration.

0 Comments
Continue reading

Don’t Be Neutral about Net Neutrality!

b2ap3_thumbnail_how_big_is_your_piece_400.jpgLighting up the airwaves in the United States is the issue of net neutrality. It's a complex and technical topic regarding Internet regulations, but don't let the fine print keep you from caring. This is an important topic that could affect how the Internet is consumed around the globe!

0 Comments
Continue reading

Warning: Protect Yourself from Cryptolocker and GameOver Zeus Now!

b2ap3_thumbnail_gameover_zeus_and_cryptolocker_400.jpgIt has been two weeks since the National Communications Association warned the world about the GameOver Zeus and Cryptolocker ransomware, and if you haven't taken steps to avoid these threats, it's not too late - if you haven't been infected yet, do so as soon as possible. Otherwise, your network will be vulnerable, and so will your banking credentials.

0 Comments
Continue reading

5 Mobile Apps to Help You Translate the World Cup

b2ap3_thumbnail_translation_applications_400.jpgWhether you're watching the World Cup or going on a business trip overseas, you will experience foreign cultures and run into what's known as "the language barrier." Thanks to technology, you can quickly and easily make sense of World Cup statistics, or make your way around a city where English isn't the norm.

0 Comments
Continue reading

Don’t Even Think About Disabling Your Antivirus Software!

b2ap3_thumbnail_do_not_remove_antivirus_400.jpgDoes your company have dedicated antivirus software to protect it against the annoying threats on the Internet? Sometimes, a computer virus can weasel its way past your software, but there's no greater frustration than when you realize that the reason you contracted a virus is because an employee disabled your software. Don't let this happen to you!

0 Comments
Continue reading

5 Good Reasons Your Business Should Use a Virtual Private Network

b2ap3_thumbnail_virtual_private_network_400.jpgWhether you're on the move or at the workplace, your WiFi connection isn't the most secure method of browsing the Internet. Hacking techniques are growing more sophisticated, and you never know who could be observing your connection and Internet activity. Thankfully, there are ways to remediate this issue, like using a Virtual Private Network (VPN).

0 Comments
Continue reading

Turn Up the Cuteness with Pets at Work!

b2ap3_thumbnail_pets_at_work_400.jpgWe've come across a fun, furry idea to relieve workplace stress. Kitties and puppies! In a fun twist to the workday, many companies are allowing staff to bring their pets with them to the office, and the results are adorable!

0 Comments
Continue reading

The Future of Data Storage, or Just a Really Long Cassette Tape?

b2ap3_thumbnail_sony_185tb_tape_revolutionary_400.jpgIn this day and age, your company's data is extremely important. Without it, your company would likely cease to exist. But, it's not just you - the entire world is this way, and the more information that's out there, the more storage and backup that is needed. Professionals are constantly looking for ways to expand the way we store data, and last month, Sony managed to discover something entirely new that may change the way that we store our information.

0 Comments
Continue reading

3 Father’s Day Gifts that A Business Dad Needs!

b2ap3_thumbnail_fathers_day_june_15_400.jpgIf your Dad happens to be a business owner, then you know how hard it can be to give him a nice Father's Day present. Business owners tend to be good at buying themselves whatever they need or want. Every business owner can benefit from IT services. It's the gift that keeps on giving!

0 Comments
Continue reading

3 Tips to Shield Your Business From A Data Disaster

b2ap3_thumbnail_the_data_shield_400.jpgTake a moment to consider your answer to this question, "What would you do if all of your business's data was somehow lost overnight?" How would you react, and what would you do about it? Your data is valuable, so much in fact that your business would be lost without it, and likely wouldn't be able to run properly.

0 Comments
Continue reading

Escape the Phisherman’s Hook – 4 Tips to Get You off the Line

b2ap3_thumbnail_phishing_scams_400.jpgThe Internet is a vast ocean filled with all sorts of different creatures. Many are harmless, like the bottlenose dolphin, but once in a while you will encounter an aggressive shark. But no matter how powerful or intelligent these creatures are, they still wind up flopping around on the deck of some fisherman's boat. Why? Because fishermen know what they're looking for and how to capture it. The same can be said about Internet phishers.

0 Comments
Continue reading

Be Wary of Bitcoin Fraud

b2ap3_thumbnail_bitcoin_400.jpgOn May 7, 2014, the U.S. Securities and Exchange Commission (SEC) released a news alert declaring Bitcoin, and all other virtual currencies insecure and unsafe. Due to a rise in Bitcoin popularity, many investors and business owners like to use it for worldwide transactions. But, how safe is it, and how likely are you to run into a Bitcoin fraud scheme?

0 Comments
Continue reading

4 Reasons Why Modern Businesses Today Need Remote IT Support

b2ap3_thumbnail_remote_it_400.jpgTechnology might be growing more mobile, but the need for support remains the same. Yet, the need for technical support on-the-go grows ever more important. What will happen to your business if you aren't able to get IT support, and it's an emergency?

0 Comments
Continue reading

IT Security Could Cost You Your Job!

b2ap3_thumbnail_lock_it_down_400.jpgIn December 2013, retail superpower Target was the target (hehe) of a massive data breach that could have affected as many as 110 million customers. On Monday, May 5, 2014, the CEO of Target, Gregg Steinhafel, announced that he would be stepping down, no doubt a result of the chaos that engulfed his company in the aftermath of this data breach. Target's CFO, John Mulligan, has stepped in as interim CEO until the position is filled once again.

0 Comments
Continue reading

Microsoft Set to Release Windows Phone 8.1

b2ap3_thumbnail_cortana_400.jpgMicrosoft has changed its tune recently. They have made a serious push to take advantage in the mobile computing explosion by creating software that is designed specifically for the mobile device user. When the software giant released Windows Phone 8 in the fourth quarter of 2012, many thought it was only a matter of time before the software would resonate with mobile users. Unfortunately for Microsoft, the smartphone market hasn't been as friendly as the home and business computing market, and Windows Phone 8 has been a thorough disappointment.

0 Comments
Continue reading

Danger: GameOver Zeus Botnet Threatens Windows Users

b2ap3_thumbnail_game_over_zeus_400.jpgA new botnet threat could spell "game over" for unaware Windows users - the threat targets almost all versions of Windows and Windows Server (excluding Windows 8.1). Even though the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice have disrupted it, users are still at risk. Thankfully, they still have time - two weeks, until the threat returns.

0 Comments
Continue reading

How to Avoid a Major Spelling Debacle in Microsoft Publisher

b2ap3_thumbnail_publisher_400.jpgSpell check makes spelling super easy. All you have to do is regurgitate a string of letters that halfway sound like the word you're thinking of and the red squiggly line will take care of the rest. Admittedly, spellcheck has turned most of us into lazy spellers, which is why it's crucial that your spell check settings are adjusted properly when using Microsoft Publisher.

0 Comments
Continue reading

Make Your Chromebook Shine With These Two Easy Tips

b2ap3_thumbnail_chromebook_tips_400.jpgMobile devices are designed for different purposes than the big, bulky desktops are. The Chrome operating system of the Google Chromebook is a perfect example of this - it looks like nothing but a browser with a keyboard. Sure, it can't do everything a real computer can do, but it sure can do a lot more than some people give it credit for.

0 Comments
Continue reading

Internet Explorer 8 Zero-Day Vulnerability Found, but Not Patched

b2ap3_thumbnail_vulnerability_microsoft_400.jpgWith the world still on edge about the recent vulnerability found in most versions of Internet Explorer, another one has been discovered, this time in Internet Explorer 8. This bug allows a hacker to execute malicious code when a user opens an infected email or webpage.

0 Comments
Continue reading

On the Lighter Side, Dogecoin Cryptocurrency Hacked

b2ap3_thumbnail_dogecoin_wow_400.jpgWe all know about the cryptocurrency Bitcoin, but do you know about Dogecoin? Its figurehead, the grammatically-challenged Shiba Inu, quickly became an Internet sensation called the Doge meme, and was adopted as the mascot for Dogecoin. However, before you go out and buy yourself some Dogecoin for you and your buddies, you should know that its database, the Doge Vault, has been hacked.

0 Comments
Continue reading

Tomorrow Never Downloads: Protecting Your Database from Corporate and International Espionage

b2ap3_thumbnail_security_from_espionage_400.jpgFirewalls are the first thing companies think of when it comes to data security. What is the last security risk on an organization's mind? Your most tech-savvy employee. If someone were to "get to" the employee overseeing your network, they would be able to do some serious damage. What are you doing to protect your data from the employees you trust the most?

0 Comments
Continue reading

Spring Cleaning Your In-House IT

b2ap3_thumbnail_spring_cleaning_400.jpgMany people often associate the coming of spring with spring cleaning, or giving their house a good frisking. They use this opportunity to get rid of all of the junk they don't need anymore, such as useless wedding gifts or things they haven't touched, let alone seen, in years. The same thing can be done with your IT department at the workplace.

0 Comments
Continue reading

Is It Possible to Encrypt the Entire Internet?

b2ap3_thumbnail_encrypt_the_internet_400.jpgMany websites around the world are still suffering from the nasty little bug called Heartbleed that we covered last month. This prompted over 30,000 TLS/SSL certificates to be revoked and reissued, but many of them were reissued with the same keys. If this was going to happen, why revoke and reissue them in the first place? They're still just as vulnerable as before, since Heartbleed could have leaked those same keys weeks ago.

0 Comments
Continue reading

George R. R. Martin’s Tech is as Ancient as His Fantasy Works!

b2ap3_thumbnail_george_r_r_martin_400.jpgWhen it comes to productivity, the latest technology can be a huge boon. A proper word processor can increase your productivity drastically if you know how to use it. However, one of today's most ingenious writers - George R. R. Martin - is still stuck in the Stone Age of word processing technology!

0 Comments
Continue reading

Ebay Hacked - Hold Onto Your Shopping Cart (And Your Password)!

b2ap3_thumbnail_ebay_400.jpgeBay issued an official declaration on Wednesday, May 21, 2014 that one of its databases had been hacked. The worst part? This database, which housed users' passwords, was compromised. But, there is a silver lining to all of this - no information has been stolen.

None that they know of, anyway. The auctioning website is still cautioning users to change their passwords in light of the attack.

0 Comments
Continue reading

Is Microsoft’s “Patch Tuesday” Revealing XP Vulnerabilities?

b2ap3_thumbnail_windows_eight_updates_400.jpgIn light of all of the recent vulnerabilities found in Microsoft's Internet Explorer browser and Windows XP operating system, owners of XP are growing nervous about the upcoming "patch Tuesday," Microsoft's monthly patch release day. But, what if what Microsoft isn't patching in the newer operating systems is what needs to be patched the most in XP?

0 Comments
Continue reading

Save Money and Go Green with These Printing Tips!

b2ap3_thumbnail_change_it_400.jpgHow much paper and ink does your company use every week? Every month? Every year? More importantly, how much does this wind up costing your company in the long run? According to a study by 14 year-old science fair wiz Suvir Mirchandani, it was discovered that his Pittsburgh-area school district could reduce ink consumption by 24 percent and save an average of $21,000 a year by simply switching fonts. That's half of what the average American's annual salary is!

0 Comments
Continue reading

Technology and Life Insights from “The Most Connected Human on Earth.” Part 2

b2ap3_thumbnail_dancy1_400.jpgIn our previous blog article, we introduced you to Chris Dancy, aka "The Most Connected Human on Earth." We told you Chris' story, how the former IT manager lost his job due to corporate downsizing and then turned to quantitative technology to find relevance in an ever-changing work environment. Today, Chris utilizes hundreds of different technologies and systems as part of his "quantitative life existence." In part two of our interview with Chris, he explains how you too can be a connected human.

0 Comments
Continue reading

Don’t Let New Technology Blind You

b2ap3_thumbnail_eye_pain_400.jpgIf your workplace is filled with computers, you likely experience a number of eye-straining problems related to your technology. According to All About Vision, symptoms of computer eye strain impair 50-to-90 percent of all computer workers. That's a pretty good-sized chunk of your employees, and they probably don't enjoy any of these symptoms, including physical fatigue, decreased productivity, and even increased error rate.

0 Comments
Continue reading

New iPhone Vulnerability: Lock Screen Can Leak Your Contacts!

b2ap3_thumbnail_b2ap3_thumbnail_siri_vuln_400_20140617-115955_1.jpgThink your data is safe when you lock your phone? Thanks to a newly discovered vulnerability with iOS 7.1.1 (the latest version), a hacker has the ability to bypass your lock screen and easily access your contact information.

0 Comments
Continue reading

Do You Have an IT Professional Aiding Your Technology Choices?

b2ap3_thumbnail_b2ap3_thumbnail_outsource_it_400.jpg Who's in charge of making the decisions in your business concerning technology? Ideally, you want an internal IT manager or a CIO with IT experience calling the tech shots. However, many businesses don't have this luxury. According to a CompTIA survey from last November, 48 percent of businesses have managers making decisions about technology implementation that don't have IT experience.

0 Comments
Continue reading

Microsoft Pushes Back Windows 8.1 Update Deadline

b2ap3_thumbnail_windows_8_point_1_update_400.jpgMicrosoft stated weeks ago that they would no longer support Windows 8.1, unless the operating system was updated to Windows 8.1 Update by May 13th. But one day before the deadline, Microsoft announced they have pushed the deadline back substantially. This update is crucial if you desire to continue receiving patches and updates from the company. Which you should!

0 Comments
Continue reading

CTRL - One Key to Rule Them All

b2ap3_thumbnail_sb_meme_400.jpgLet's face it, no matter how quickly you can type, there is only so much you can accomplish without the use of keyboard shortcuts. Perhaps you never cared to learn them, or maybe you never had the opportunity. Now that you own a small business, your productivity and efficiency is at stake. Thankfully, some of the most useful shortcuts utilize one common key: the Control key.

0 Comments
Continue reading

How to Properly Cite Sources in Microsoft Word 2013

b2ap3_thumbnail_word_2013_400.jpgMost people think of Microsoft Word as a normal word processor, and to an extent, that's exactly what it is. But did you know that Word 2013 has a built-in citation mechanism for your research needs? Say you are writing a white paper for marketing use, and you took specific statistics from a website. You want to make sure you cite these facts. Why? Because if you cite them, it makes your business look professional, and it looks good when you know how to credit someone else's work.

0 Comments
Continue reading

Red Light, Green Light – 4 Tips for Increasing Blog Traffic

b2ap3_thumbnail_weblog_tips_400.jpgYou've just started your own small business, and your head is swimming with ideas that you want to share with the entire world. You create a blog and publish a few articles, but only get a few hits. You sigh, write another entry, and then shut down your computer for the night. This happens for a few days, which turn into weeks, and months, and something doesn't feel right to you. Why aren't you getting any viewers?

0 Comments
Continue reading

The Virtual Hand that Terrorizes the Cradle

b2ap3_thumbnail_internet_connected_security_400.jpgIn today's connected home, Internet security needs to extend beyond the PC. Any device that's connected to the Internet needs to be password protected, secured with a firewall, and utilize available security apps. These precautions should be taken even with seemingly harmless devices like baby monitors. A family from Ohio recently learned this lesson the hard way.

0 Comments
Continue reading

Microsoft Patches Internet Explorer Bug--Even for Windows XP!

b2ap3_thumbnail_update_three_400.jpgMicrosoft put out the fire from the zero-day bug affecting users of its popular web browser Internet Explorer by releasing a security patch. This IE bug is a bad one that allows hackers to take over a PC. The patch was released on May 1st and if you haven't yet applied it to your PC, then you should do so right away!

0 Comments
Continue reading

Is Your Business Ready for the Security Challenges of Wearable Tech?

b2ap3_thumbnail_wearable_security_400.jpgDue to the growing popularity of employees using their personal devices in the workplace (BYOD), many companies have created BYOD policies to handle the unique security threats brought about by these devices. Does the new trend of wearable technology mean that you need a separate WYOD policy?

0 Comments
Continue reading

C-C-Click Click, and Other Symptoms of Hard Drive Failure

b2ap3_thumbnail_click_click_400.jpgYour mind is racing at a mile a minute, and you keep a to-do list for all of the things you are supposed to do. Unfortunately, that to-do list is often forgotten about. You save it as a .DOC text file on your computer, which has been making a strange clicking noise lately. But one day, the clicking sound gets worse, and worse, and worse, until your computer stops working completely. Just like that, all of your data is gone, and that's when it hits you.

0 Comments
Continue reading

The Database Hack that Brought Down the Galactic Senate

b2ap3_thumbnail_star_wars_logo_400.jpgOn May 4th you may see more Star Wars T-shirts than normal. This is because May 4th is recognized around the galaxy as Star Wars Day (May the 4th be with you). Thanks to the abundant use of technology throughout this science fiction franchise, you can bet your podracer that we can find an IT lesson from Star Wars that can help your business!

0 Comments
Continue reading

Space Technology Repair By Chewbacca

b2ap3_thumbnail_chewy_face_400.jpgAcross the galaxy, Star Wars fans will be celebrating their beloved science fiction franchise on May 4th (May the fourth be with you). One of the most fascinating aspects about Star Wars is its space technology. As cool as lightsabers and blasters are, Star Wars tech can break down just like our modern space technology. Concerning technology repair, we think troubleshooting space tech in our day can be just as exciting as repairing space technology "a long time ago in a galaxy far, far away."

0 Comments
Continue reading

Breathe Life into Your Laptop Battery

b2ap3_thumbnail_battery_low_400.jpgIf we told you that a battery's performance decreases as time goes on, how many of you would be surprised? The same goes for anything. Nothing lasts forever, and batteries are no different. However, there are ways you can increase the lifespan of your laptop's battery. Portable technology is important for your business, and a good, strong laptop battery is necessary.

0 Comments
Continue reading

You Better Upgrade Windows 8.1...or Else!

b2ap3_thumbnail_windows_eight_point_one_400.jpgWell, that didn't take long. Eight months ago Microsoft released Windows 8.1 and now they're sounding the alarm that users better comply and install the latest updates or lose security support from Microsoft. What makes this news peculiar is that it took 12 years for Microsoft to reach the same verdict with its popular Windows XP operating system. What gives, Microsoft?

0 Comments
Continue reading

Alert! Major Bug in IE for XP is NOT Getting Fixed

b2ap3_thumbnail_alert_many_400.jpgA lot of people use Google Chrome or Firefox as their browser of choice, and it's easy to see why. They are updated constantly and have great features. However, a lot of people still stick to what they know and love - Internet Explorer. There are a lot of people out there that still use this browser, and they should be warned that a new vulnerability exists in the system.

0 Comments
Continue reading

3 Internet Dangers That Can Harm Your Kids and What You Can Do About Them!

b2ap3_thumbnail_protect_your_kids_400.jpgThe Internet is a powerful tool. Another powerful tool is the circular saw. You wouldn't give your kid a circular saw and let them use it without any supervision. In the same way, you shouldn't let your kid use the Internet unsupervised and without any training.

0 Comments
Continue reading

Internet Security: This Is Why We Can’t Have Nice Things!

b2ap3_thumbnail_security_from_hackers_400.jpgWhen you were a kid, did you ever ask your parents for a cool new toy only to have your request denied because you were in the habit of breaking everything? Your parents would point out your destructive habit and tell you, "This is why we can't have nice things." As an adult, the coolest toy is the Internet and hackers want to break it.

0 Comments
Continue reading

Fake App “Virus Shield” Dupes 10,000+ Users!

b2ap3_thumbnail_app_security_400.jpgThere's nothing quite like the feeling of getting scammed, and the scammers of today love using technology to rip you off and leave you with that sinking scammy feeling. The best way to avoid scams is to be proactive and know what to look for. New to your list of scams to be on the look out for are fake apps.

0 Comments
Continue reading

Landlines Shouldn’t Make You Call Out For Help - Get VoIP!

b2ap3_thumbnail_this_is_voip_400.jpgAs technology grows more and more complex, the usefulness of your business's landline is declining. There are just plain better ways of communicating - cell phones are much more portable, and the Internet allows people to communicate with others while taking care of other work. One of the best ways to communicate over the Internet is by using Voice over Internet Protocol (VoIP), which provides the best of both worlds for those stuck in the landline age.

0 Comments
Continue reading

Don’t Be Taken by the Cloud Computing Trend!

b2ap3_thumbnail_cloud_mind_400.jpgIt's the nature of trends for people to want to capitalize on them, which means that many sellers of what's trendy may have little experience working with the trends that they're selling. As a business looking to take advantage of the latest technology trends, it's important that you're not bamboozled by a smooth talking technology marketer with no depth.

0 Comments
Continue reading

Complete Your 21st Century Home with a Computerized Communications Console!

b2ap3_thumbnail_twenty_first_century_computing_400.jpgPeople in 1967 were fascinated with new technology. During this era, technology advanced so quickly in such a short amount of time that people looked in wonderment at the future and made wild predictions at what the 2000s would look like. How accurate were the predictions of the 1960's scientific community? Let's check in with Walter Cronkite to find out!

0 Comments
Continue reading

Don’t Get Trapped in PowerPoint Purgatory

b2ap3_thumbnail_powerpoint_skills_400.jpgEveryone dreads presentations, but for different reasons. Some people are just afraid of public speaking, or they are just overall unorganized. In the end, well designed presentations are essential for your company's success, whether they are given to clients or to your employees. Thankfully, there are ways to minimize the stress that giving a presentation can cause. One of the best ways to prepare a presentation is to use a Microsoft PowerPoint slideshow as an aid.

However, it's very easy to fall into "PowerPoint Purgatory", a place filled with overburdened slideshows that last for hours on end. The amount of professionals who don't use PowerPoint effectively far outweigh those who do. Directive is here to help by providing you with some useful tips to make your presentations both easy for the presenter and for the audience!

0 Comments
Continue reading

Signs Your Technology Might Be Older Than You

b2ap3_thumbnail_old_tech_signs_400.jpgWhen we think of technology in terms of age, we often look at how long the machine has lasted for. Some machines from the mid-90's are still running, which makes them almost twenty years old. In terms of human life, that's not a very long time, but if you look at it in terms of quality working conditions, you'll find that these computers are kind of like dogs and cats. They may only be several years old, but in terms of actual age, their lifespan makes them much older than you realize.

0 Comments
Continue reading

4,238,983 Records Compromised So Far in 2014… and Counting

b2ap3_thumbnail_tally_it_400.jpg2014 has been a year of technological advancement, but with any kind of advances such as these, there will always be those who want to steal the work of others. According to the Identity Theft Resource Center and , as of March this year, there have been 204 instances of data breaches this year alone. These affected companies are perfect examples of why web protection is important. Directive can provide you with this protection and peace of mind. Here are a few of the more unbelievable breaches, most of which could have been easily avoided.

0 Comments
Continue reading

Massive Workloads Call for Multiple Monitors

b2ap3_thumbnail_dual_monitors_400.jpgWhen life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking up multiple monitors. With too many windows open, your desktop becomes cluttered and your workflow impeded. Stop getting lost in your work and hook up an extra screen today!

0 Comments
Continue reading

3 New Wireless Security Solutions that Don’t Require Passwords

b2ap3_thumbnail_wireless_security_400.jpgIs your wireless router an older model? If it is, then you owe it to yourself to upgrade the latest model. Depending on your Internet connection, upgrading your wireless router may be the easiest way to increase your bandwidth. Next-gen routers also come with new easy-to-use security features that don't require passwords, making an upgrade worth the effort.

0 Comments
Continue reading