Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Better Upgrade Windows 8.1...or Else!

b2ap3_thumbnail_windows_eight_point_one_400.jpgWell, that didn't take long. Eight months ago Microsoft released Windows 8.1 and now they're sounding the alarm that users better comply and install the latest updates or lose security support from Microsoft. What makes this news peculiar is that it took 12 years for Microsoft to reach the same verdict with its popular Windows XP operating system. What gives, Microsoft?

0 Comments
Continue reading

Alert! Major Bug in IE for XP is NOT Getting Fixed

b2ap3_thumbnail_alert_many_400.jpgA lot of people use Google Chrome or Firefox as their browser of choice, and it's easy to see why. They are updated constantly and have great features. However, a lot of people still stick to what they know and love - Internet Explorer. There are a lot of people out there that still use this browser, and they should be warned that a new vulnerability exists in the system.

0 Comments
Continue reading

3 Internet Dangers That Can Harm Your Kids and What You Can Do About Them!

b2ap3_thumbnail_protect_your_kids_400.jpgThe Internet is a powerful tool. Another powerful tool is the circular saw. You wouldn't give your kid a circular saw and let them use it without any supervision. In the same way, you shouldn't let your kid use the Internet unsupervised and without any training.

0 Comments
Continue reading

Internet Security: This Is Why We Can’t Have Nice Things!

b2ap3_thumbnail_security_from_hackers_400.jpgWhen you were a kid, did you ever ask your parents for a cool new toy only to have your request denied because you were in the habit of breaking everything? Your parents would point out your destructive habit and tell you, "This is why we can't have nice things." As an adult, the coolest toy is the Internet and hackers want to break it.

0 Comments
Continue reading

Fake App “Virus Shield” Dupes 10,000+ Users!

b2ap3_thumbnail_app_security_400.jpgThere's nothing quite like the feeling of getting scammed, and the scammers of today love using technology to rip you off and leave you with that sinking scammy feeling. The best way to avoid scams is to be proactive and know what to look for. New to your list of scams to be on the look out for are fake apps.

0 Comments
Continue reading

Landlines Shouldn’t Make You Call Out For Help - Get VoIP!

b2ap3_thumbnail_this_is_voip_400.jpgAs technology grows more and more complex, the usefulness of your business's landline is declining. There are just plain better ways of communicating - cell phones are much more portable, and the Internet allows people to communicate with others while taking care of other work. One of the best ways to communicate over the Internet is by using Voice over Internet Protocol (VoIP), which provides the best of both worlds for those stuck in the landline age.

0 Comments
Continue reading

Don’t Be Taken by the Cloud Computing Trend!

b2ap3_thumbnail_cloud_mind_400.jpgIt's the nature of trends for people to want to capitalize on them, which means that many sellers of what's trendy may have little experience working with the trends that they're selling. As a business looking to take advantage of the latest technology trends, it's important that you're not bamboozled by a smooth talking technology marketer with no depth.

0 Comments
Continue reading

Complete Your 21st Century Home with a Computerized Communications Console!

b2ap3_thumbnail_twenty_first_century_computing_400.jpgPeople in 1967 were fascinated with new technology. During this era, technology advanced so quickly in such a short amount of time that people looked in wonderment at the future and made wild predictions at what the 2000s would look like. How accurate were the predictions of the 1960's scientific community? Let's check in with Walter Cronkite to find out!

0 Comments
Continue reading

Don’t Get Trapped in PowerPoint Purgatory

b2ap3_thumbnail_powerpoint_skills_400.jpgEveryone dreads presentations, but for different reasons. Some people are just afraid of public speaking, or they are just overall unorganized. In the end, well designed presentations are essential for your company's success, whether they are given to clients or to your employees. Thankfully, there are ways to minimize the stress that giving a presentation can cause. One of the best ways to prepare a presentation is to use a Microsoft PowerPoint slideshow as an aid.

However, it's very easy to fall into "PowerPoint Purgatory", a place filled with overburdened slideshows that last for hours on end. The amount of professionals who don't use PowerPoint effectively far outweigh those who do. Directive is here to help by providing you with some useful tips to make your presentations both easy for the presenter and for the audience!

0 Comments
Continue reading

Signs Your Technology Might Be Older Than You

b2ap3_thumbnail_old_tech_signs_400.jpgWhen we think of technology in terms of age, we often look at how long the machine has lasted for. Some machines from the mid-90's are still running, which makes them almost twenty years old. In terms of human life, that's not a very long time, but if you look at it in terms of quality working conditions, you'll find that these computers are kind of like dogs and cats. They may only be several years old, but in terms of actual age, their lifespan makes them much older than you realize.

0 Comments
Continue reading

4,238,983 Records Compromised So Far in 2014… and Counting

b2ap3_thumbnail_tally_it_400.jpg2014 has been a year of technological advancement, but with any kind of advances such as these, there will always be those who want to steal the work of others. According to the Identity Theft Resource Center and , as of March this year, there have been 204 instances of data breaches this year alone. These affected companies are perfect examples of why web protection is important. Directive can provide you with this protection and peace of mind. Here are a few of the more unbelievable breaches, most of which could have been easily avoided.

0 Comments
Continue reading

Massive Workloads Call for Multiple Monitors

b2ap3_thumbnail_dual_monitors_400.jpgWhen life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking up multiple monitors. With too many windows open, your desktop becomes cluttered and your workflow impeded. Stop getting lost in your work and hook up an extra screen today!

0 Comments
Continue reading

3 New Wireless Security Solutions that Don’t Require Passwords

b2ap3_thumbnail_wireless_security_400.jpgIs your wireless router an older model? If it is, then you owe it to yourself to upgrade the latest model. Depending on your Internet connection, upgrading your wireless router may be the easiest way to increase your bandwidth. Next-gen routers also come with new easy-to-use security features that don't require passwords, making an upgrade worth the effort.

0 Comments
Continue reading

The Heartbleed Fallout

b2ap3_thumbnail_heartbleed_fallout_400.jpgLast week, the Heartbleed bug was identified as a weakness in the OpenSSL cryptographic library, potentially leaking two-thirds of the Internet's secure information from any websites utilizing this encryption style. While most major websites such as Google, Yahoo, and Facebook released patches quickly, it does little to actually remediate the problem. Your data could have been leaked over the year-plus that the vulnerability could have been accessed. There is no way to know if it has been compromised.

0 Comments
Continue reading

3 Ways Cloud Computing is Changing IT for the Better

b2ap3_thumbnail_cloud_hand_400.jpgCloud computing is making everything easier. Companies that operated IT infrastructures of their own before the cloud know firsthand how much easier it is thanks to the cloud. A brief comparison of doing business before and after the cloud will show just how much cloud computing is changing things.

0 Comments
Continue reading

What’s the Secret to Multitasking?

b2ap3_thumbnail_multitask_400.jpgYou may think that you're awesome at multitasking, but according to cognitive psychologist Art Markman, "You are your own worst judge of how good a multitasker you are." This is because the same areas of your brain that monitor performance are the same areas activated by multitasking, which means that it's difficult to accurately evaluate your own performance.

0 Comments
Continue reading

Alert: Heartbleed Bug Threatens Popular Websites!

b2ap3_thumbnail_bleeing_heart_one_400.jpgOn April 7th, a new bug on the Internet was discovered that's putting millions of users' personal data at risk. Given the name "Heartbleed bug," it's capable of allowing infiltrators to collect information while you are securely browsing a SSL/TLS website. Since SSL/TLS is so widely used, it's very probably that your personal data is at risk.

0 Comments
Continue reading

The Top 3 Highest Grossing IT Trends

b2ap3_thumbnail_it_tends_to_consider_400.jpgAs the global economy experiences recovery and growth, businesses have extra capital freed up to spend on information technology. IT spending is surging, but where exactly is all of this money going? In a recent study, Gartner shines some light on IT's hottest trends.

0 Comments
Continue reading

Wearable Technology Just Got a Facelift

b2ap3_thumbnail_wearable_tech_all_the_rage_400.jpgWearable technology has dominated the tech headlines lately, and for good reason. The concept of having smart technology so easily accessible at any time is an attractive feature for many people. Some are patiently waiting for the public release of Google Glass later this year, along with many more attractive wearable technology options being released including Google's Android Wear.

0 Comments
Continue reading

The Most Expensive Paper You’ll Ever Buy… or Not

b2ap3_thumbnail_digital_paper_400.jpgIt's no surprise that technology is taking over our lives. It's everywhere; from the workplace to every inch of our homes, new technology exists where it wouldn't have twenty years ago. Bluetooth-connected kitchen appliances allow their owners to turn them on and off from a distance. Cars can connect to the Internet. Google has produced glasses that allow you to browse the Internet. There are tons of innovative, new inventions that have had a huge impact on the way small business owners manage their workplaces, but nothing can compare to the significance of being able to receive text files from anywhere in the world via email and fax.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200