Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Finding Savings in Your Underutilized Servers Part 2

a1sx2_Original1_cloudmoney.jpg

Earlier this week we talked about ways to shave your IT budget by combining your servers with a process called virtualization. This can equal big savings when you are running multiple single-task servers. Another way businesses can save money is by migrating their entire server infrastructure to a managed cloud environment.

0 Comments
Continue reading

Increase Security with Multi-Factor Identification

a1sx2_Original1_laptopsafepw.jpgUsing a strong password with complex combinations of letters and numbers will go a long way in protecting your account, but passwords provide only one level of protection against hackers. Additional levels of security can be added with multi-factor authentication. This is the best protection available for your internet accounts, and major technology companies have recently made this a reality for the public.

0 Comments
Continue reading

Finding Savings in Your Underutilized Servers, Part 1

a1sx2_Original1_walletethernet.jpgWhen budgeting, most businesses will look at ways to save by spending less on products and services, like downgrading to storebrand cola. These cuts are never popular and have been known to insight office mutinies, "Dr. Thunder, are you kidding me?" Before you deprive employees of premium products, first take a look inside your server, it may be full of savings!

0 Comments
Continue reading

File Sharing Options to Consider

a1sx2_Original1_cloudfilecabinet.jpgIt's the information age. If you are always on the go, or you work as a member of a team, it helps if your work is accessible remotely. The ability to have relevant files on hand is nice and at times can be essential to the welfare of your business. Below are a few cloud-based options that could offer you or your company a solution for your remote file access needs.

0 Comments
Continue reading

3 HandyTools to Remember Your Passwords, Part 2

a1sx2_Original1_passwordpostits.jpgLast time, we spoke about password security, we went over the importance of using strong passwords to avoid identity theft. In part two, we will discuss three easy password solutions that can help you manage all of your different passwords.

0 Comments
Continue reading

Password Vulnerability and Security, Part 1

a1sx2_Original1_lockeddownlaptop.jpgA weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).

0 Comments
Continue reading

Troubleshooting a Wet Cell Phone

a1sx2_Original1_sinkingphone.jpgStories about smartphones getting wet usually have a funny twist to them, unless it is your own device, in which case the story is comparable to a Shakespearean tragedy. Whether your toddler threw your iPhone in the toilet, or your Galaxy S3 took up swimming, there are a few tricks you can try before dropping cash on a new device.

1 Comment
Continue reading

Know These 4 Intruders that Threaten your Business

thief climbing in windowIn order to best serve their clients, companies need to have a comprehensive program in place to help them defend their systems from malware attacks on their company's infrastructure. These attacks can have a devastating effect on a business's continuity, so having an appreciation for exactly what types of adversaries your company is up against is important. There are several types of potential intruders that you should be aware of.

0 Comments
Continue reading

The Quest for the Paperless Office

a1sx2_Original1_paperlessoffice10.jpgEver since the first microfilm machine was rolled off the line 100 years ago, mankind has been striving to achieve the paperless office. If you are too young to remember using microfilm, think of an arcade cabinet, except, instead of Mortal Kombat, documents battle it out over a projected screen. Thankfully, we have come a long way in 100 years.

0 Comments
Continue reading

The Fall of the Mighty Fax Machine

a1sx2_Original1_smokingfaxmachine.jpgIf Back to the Future's Marty McFly time traveled to the modern office, he would probably feel a little disoriented. He would see employees squinting at little televisions, mobile devices right out of Star Trek, and no rows of file cabinets. Then Marty would notice a fax machine and feel right at home, because fax machines have been around forever.

0 Comments
Continue reading

VoIP, More Features and New Possibilities

a1sx2_Original1_voipkey.jpgIf you are reading this, then you obviously have an internet connection. Most internet users browse websites, check emails, and perhaps play a game or two, but if these activities are the extent of your internet usage, then you are missing out on a powerful, cost-effective tool called VoIP that uses the internet to entirely replace your old phone system.

0 Comments
Continue reading

5 Email Threats You Must Know

a1sx2_Original1_junkmail10.jpgIf only spam were true. You would have thousands in unclaimed money, cute singles would be lining up to meet you, and there would be a magic pill that would revolutionize your personal life. Some spam is so ridiculous they are instantly deleted, others are more subtle and dangerous. Here are some threats to watch out for before you open that unsolicited email.

Tags:
0 Comments
Continue reading

Pirates Ahead, Be Ye Warned!

a1sx2_Original1_pirateman.jpg"Ahoy ye swabbies! We be takin' heavy damage on the starboard side! Brace ye-selves for impact! Arrrr!" That is pirate talk for "Hello fellow co-worker. Our CRM tools crashed again and IT needs to reboot the server." September 19th is Talk like a Pirate Day!

0 Comments
Continue reading

5 Factors When Shopping for Upstate New York IT Support

nametag Are you looking for a new computer service provider? Deciding on a company to handle your technology is a choice that carries a little more weight than let's say, switching your cable provider. You are essentially giving this new computer company access to all of your company's sensitive information. No pressure!

0 Comments
Continue reading

Is the Apple’s iPhone 5 Built for Business?

a1sx2_Original1_iphone5.jpgSeptember 21st is the official launch date for Apple's iPhone 5. In typical Apple hype, they officially released the specs one week before launch, putting an end to wild rumors and ruining underpants all around the MacHead community. If you are an Apple aficionado, upgrading to the iPhone 5 will be a knee-jerk reaction, but if you find yourself on the fence then check out what's new.

0 Comments
Continue reading

Travel With Free Wi-Fi

a1sx2_Original1_freewifilogo.jpgEverybody likes the free goodies in a hotel room, tiny shampoo bottles, coupons to nearby restaurants, and HBO top the list. Wi-Fi however, our favorite goodie, sometimes fails to make the complimentary goodie list. It seems a little messed up to us, that hotels (the place you work and sleep) charge you for Wi-Fi while Burger King gives it away for free, but we have found a Wi-Fi loophole to help you out.

0 Comments
Continue reading

There’s Electricity in the Air Over Intel’s New Chip

a1sx2_Original2_wirelesscharging.jpgIntel has been conducting experiments that would make electricity pioneer Nikola Tesla proud. Intel plans to get consumers charged up over their newest technology that will allow laptops to provide electricity to nearby smartphones without cables. Enough with the electricity puns - we're just ecstatic about this new technology!

0 Comments
Continue reading

5 Tips to Make Yourself a Better Presenter


a1sx2_Original2_girlgivingpresentation.jpgSpeaking to a crowd, especially one comprised of your peers or potential clients, is a nerve wracking experience. All too often, a speaker will put all his/her effort into a PowerPoint with graphics worthy of James Cameron or distracting animations that spin, sparkle, and pop. As the speaker, you're the focus. Here's a few tips to keep your audience captivated:

0 Comments
Continue reading

Protect your Dropbox with Two-Step Authentication


a1sx2_Original3_phonepadlock.jpgDropbox, a popular file-hosting service for both home-users and businesses, recently added a new security feature to prevent unauthorized access to your Dropbox files and folders. You can enable Dropbox to send a security code to your mobile phone whenever you log in.

0 Comments
Continue reading

Prevent your Web Browser from Storing Passwords

typing in username and passwordFor sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200