Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways to Start Marketing Your Company to Mobile Users

b2ap3_thumbnail_mobile_marketing_your_business_400.jpgYou may have realized that marketing and advertising tactics are shifting toward reaching mobile leads. Even superstar companies like Google and Facebook are delegating more marketing dollars to their mobile marketing budgets after a discovery that nearly one-fifth of Google's revenue comes from mobile searching. Here are three ways your company can start up your mobile marketing initiative.

0 Comments
Continue reading

4 Giveaways that Your Email is Trying to Trick You

b2ap3_thumbnail_avoid_phishing400.jpgOne of the most common ways computer viruses spread is through email. Most of the malware-carrying messages are caught in your account's spam filter, so you don't have to worry about those. It's the malicious emails that make it to your inbox that you need to be mindful of, and phishing emails are by far the most dangerous.

0 Comments
Continue reading

2 Million Passwords Stolen! Have You been Hacked?

b2ap3_thumbnail_pword400.jpgOn December 3, 2013, security company Trustwave discovered over two million stolen user passwords for popular online services like Facebook, LinkedIn, Google, Twitter, Yahoo, and 93,000 other websites. There's a high probability that you use one of the services affected by the hack. Is your personal information compromised?

0 Comments
Continue reading

Watch Your @#%!ing Mouth at Work!

b2ap3_thumbnail_smdb400.jpgLanguage is one of the biggest contributors to determining office culture. For example, a workplace where the management motivates with threats will be a completely different environment than an office where encouragement is liberally applied. The allowance or forbiddance of swearing is another major indicator of your company's culture. How does the language in your office reflect your company's values?

0 Comments
Continue reading

Don't Make These eBay Mistakes

b2ap3_thumbnail_ebay400.jpgSince 1995, eBay has become an online giant, and an obvious choice in the ecommerce industry. Buyers and sellers have taken to this online platform as a convenient solution to acquire things they want, and sell things they don't.

0 Comments
Continue reading

3 Ways Green Technology Can Help Your Business

b2ap3_thumbnail_greengears400.jpgToday's business environment is environmentally conscious. Companies that implement green policies and use energy-saving technologies are making a positive impact on the environment. Going green is the responsible thing to do and will also positively impact your business. Here are three ways using green technology can benefit your business.

0 Comments
Continue reading

How Do You Store Your Priceless Pictures?

b2ap3_thumbnail_cheese400.jpgIf your house was on fire and you only had one trip to rush in and rescue one item, what would it be? Most family-minded individuals would choose their photo album because it's irreplaceable. Insurance money can replace most household and personal items, but not photos. It's important to have a backup plan to keep your prized pictures safe from disasters.

0 Comments
Continue reading

When Negative Customer Feedback Can Help Your Business

b2ap3_thumbnail_troll400.jpgAs a business owner, your business is your baby. Therefore, it's easy to take it personally when a customer says something negative about your company. It feels kind of like a stranger calling your newborn baby ugly. Don't overreact to negative opinions by overhauling your business model; you can actually use negative customer feedback to your advantage.

0 Comments
Continue reading

Don’t Let These 3 Easy Oversights Compromise Your Network

b2ap3_thumbnail_lockblu400.jpgThere is a common misperception that strong anti-virus software is all you need to cover the security of your network. While anti-virus software is an important component to network security, there's more to it if you want a secure network. You need to also take into account the human factor, which can disable even the strongest software solution.

0 Comments
Continue reading

How much is Your Printer Costing You?

b2ap3_thumbnail_loot400.jpgAs a business owner, you are always on the lookout for money saving solutions. Technology offers cost-effective options because it can be used to save money by implementing something new, instead of making cuts. A print server solution is one example of how upgrading your technology can save you money.

0 Comments
Continue reading

5 Tips to Help a Cyborg Make a Good Impression

b2ap3_thumbnail_humanbot400.jpgThe fact that over half of all working adults own a smartphone is changing not only the way we do business, but also how we interact as a species. With the development of smart glasses and watches, we are seeing technology becoming even more intertwined with our bodies, effectively turning people into cyborgs.

0 Comments
Continue reading

Is That Mobile Device Protection Plan Worth It?

b2ap3_thumbnail_shattereddreams400.jpgUpselling and add-ons are the reason why you go to buy a new smartphone, expecting to pay the too-good-to-be-true sale price, and walk out locked into a contract that costs twice as much as you planned on spending. One add-on that's pushed hard is the device protection plan (smartphone insurance). Is a protection plan worth the expense?

0 Comments
Continue reading

Losing Data? Stop Cloning

b2ap3_thumbnail_backupagain400.jpgWhat would you say if we told you that disc error rates have been found to be ten times worse than what the vendor's drive specifications state? They're not lying, they are just predicting their own drive's failure rate. In order to be accurate, you must account for failure rates associated with the disk controller, the cables, the PCI bus, the memory, and the processor as well.

0 Comments
Continue reading

4 Tips to Not Be that Guy

b2ap3_thumbnail_coffee400.pngThe cool thing about using mobile devices equipped with tools that will allow you to remotely access your company's files from anywhere, is that you now have the freedom to work from literally anywhere. Just be careful not to abuse this freedom. Here are 4 tips to help you work on the go without annoying everybody around you.

0 Comments
Continue reading

Bury Your Treasured Files With TrueCrypt

b2ap3_thumbnail_tcsquare400.pngHow vulnerable is your sensitive data on your PC to unwanted threats? Can anyone who gains access to your computer be able to easily find this data and do whatever they wish to it? If these files were encrypted and then hidden from view, you can neutralize the possibility of it happening.

0 Comments
Continue reading

Know the Risks of the Internet before Logging On

b2ap3_thumbnail_virus400.jpgDriving a powerful car can be an exhilarating experience, but if you have no idea what you're doing, it can be dangerous. This is why governments require drivers to pass a safety class before they can speed down the road encased in steel and glass. The Internet is also a powerful tool that can be exciting, beneficial, and dangerous.

0 Comments
Continue reading

Take the Time to Safely Remove Your Device

b2ap3_thumbnail_flash400.jpgAt the end of the workday you may be in a hurry to leave, and as you start tossing your belongings into your bag, you come across your USB drive plugged into your PC. You're now faced with a tough decision; do you take the time to safely remove the device, or do you save 30 seconds and just unplug it?

0 Comments
Continue reading

Train Your Employees with VoIP

b2ap3_thumbnail_voip.jpgVoice over Internet Protocol (VoIP) is a communication tool designed for business. VoIP takes advantage of your Internet connection to dramatically reduce your phone bill, sometimes by as much as 80% compared to traditional long distance plans. VoIP also comes with unique features to that will assist your company in customer service and employee training.

0 Comments
Continue reading

Google Reader Refugees Take To Feedly

b2ap3_thumbnail_feedly400.pngThe expiration date for Google Reader is set for July 1, 2013. Google’s decision to axe the Reader was not because it was unpopular, but rather, it seems like Google wants to focus their energy into fewer products. This announcement leaves many Google faithful out in the cold, and Feedly has welcomed the Google huddled masses yearning to read free.

0 Comments
Continue reading

Your Tape Backup is a Business Risk

b2ap3_thumbnail_tapefail400.jpgThere was a time when tape backup was the cheapest and the standard data backup solution for businesses. Over the years, cloud services have become more affordable, and now cloud backup solutions like a BDR are cheaper and give businesses more security features. If you are still backing up with tape, then you may be losing money and even putting your business at risk!

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200