Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Bandwidth Defined

The Internet has become an irreplaceable part of many business’ operations, which brings the thought into question of how much you rely on it for your daily duties. Technology has changed the way that the Internet works for the better, but there is one part of its operations that still lies at the heart of it: bandwidth.

0 Comments
Continue reading

Tech Term: Bits and Bytes

Running a business sometimes requires attention to very minute details, and some things must be measured in order to achieve optimal efficiency. You’ve likely heard the terms bits and bytes used regarding data storage or transfer, but do you know what the difference is between them? Today’s tech term is dedicated to this explanation.

0 Comments
Continue reading

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

0 Comments
Continue reading

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

0 Comments
Continue reading

Shining Light on the Mysterious Dark Web

During your time in the business world, you may have heard about the Dark Web. It’s a place that’s filled with illegal activity, with some of the most notable being online marketplaces where credentials and personal records can be sold to the highest bidder. However, there’s much more to the Dark Web than meets the eye.

0 Comments
Continue reading

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Sherlock Holmes is one of the most famous detectives in fiction, but without his dear Dr. Watson, he would have been stumped on occasion. There’s a good reason why IBM named its super-intelligent computer, Watson, after the famous character. True to its namesake, Watson is now being used to safeguard 40 organizations from cyber security threats.

0 Comments
Continue reading

Here’s How to Make the Internet Far Less Distracting for Your Team

The average office worker needs to access the Internet in order to do their job. What they don’t need to access is cat videos, memes, social media, online games, and malware-ridden websites. How can a business owner clamp down on Internet activity in their office? By equipping their network with a content filtering solution, of course.

0 Comments
Continue reading

Net Neutrality Still Needs Your Help!

December 14th is the last day that our government representatives can vote whether or not to continue the Internet’s protection under the net neutrality rules established in 2015. Without these rules in place, your data can be analyzed by your Internet service provider, and they are free to act on that knowledge and manipulate your Internet in support of their own interests.

0 Comments
Continue reading

The Monopoly of ISPs

Many of those in favor to end net neutrality focused not on the issues of technology, but on the principles of the 'invisible hand,' otherwise known as the free market. Their argument, as espoused by Ajit Pai, is that regulation - particularly that of net neutrality - stifled innovation, and it’s that lack of variation which is the cause of so many of us being stuck with crummy internet options. In fact, Mr. Pai has a valid point, states and countries with multiple ISP services, do seem to have better outcomes for their customers. The problem is most of us don’t live in those places and don’t have many, if any, choices but one or two.

0 Comments
Continue reading

Getting to Know Technology: Plug-In

The Internet is an amazing tool in and of itself, but like many tools, it can sometimes work better if other tools are used alongside it. These additional tools are called plug-ins. Here, we’ll discuss what a plug-in is, and how they all help us use the Internet a little better.

0 Comments
Continue reading

Three Reasons VoIP is a Great Choice for Businesses

If you’re trying to run your business without considering communication, you’re crippling your business unnecessarily. One of the ways that you can improve communications is by capitalizing on a modern phone system that uses the cloud. You might be surprised by how great a cloud-hosted VoIP solution works for your business--especially if you haven’t thrown out the traditional telephone handset yet.

0 Comments
Continue reading

The Chrome Browser is Redefining Your Security

When you are surfing the web, do you know if you are secure? Typically, your browser will tell you when a site is secure or not. This is especially important if you are putting in sensitive information, like passwords or credit card information. Google Chrome is stepping up it’s game to keep users safe.

0 Comments
Continue reading

Google’s Inflated Plan to Get the Internet to Billions of People Who Don’t Have It

It’s hard to believe that half of the world still doesn’t have access to the Internet. When so many people in the west take their near-ubiquitous Internet accessibility for granted, over three and half billion people don’t have access at all. Years ago, Google created what came to be known as X (or Google X) which was basically a research-and-development facility.

0 Comments
Continue reading

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

0 Comments
Continue reading

World's Third-largest Botnet Brought Down, Global Spam Cut in Half

Delete Spam keyboard keyEveryone who uses e-mail has become accustomed to finding the occasional Spam e-mail. No matter how careful you are, it's only a matter of time before you receive a Viagra testing e-mail, the South African Inheritance Tied Up in Legal Battles, or the Winning of a Sweepstakes that you never signed up for. Where do those e-mails come from?

0 Comments
Continue reading

What's New in Firefox 13

Firefox logoFor those who use Mozilla Firefox as our web browser of choice, you may have noticed that there have been a large number of updates over the past year, leaping from version 4 to the now current Firefox 13. Mozilla has been following an aggressive roadmap to improve performance and features.

0 Comments
Continue reading

What to do when your Data is Breached

thermostat

This has been a pretty common topic for us on the Directive blog. We've seen a lot of Upstate New York clients and customers suffer the consequences when online retailers and other account providers experience a security breach. It is equally vital for consumers to know what to do in the event of a security breach as it is the company that is actually breached.

0 Comments
Continue reading

What is Pinterest and Why It Matters to Upstate New York Businesses

Pinterest logo

Social Media is a tough industry - the only way a good social network can succeed is by being extremely popular, and it takes a lot of criteria for that to happen. A social network site either has it or it doesn't, and Pinterest apparently has it in massive quantities.

0 Comments
Continue reading

Scareware - The Latest Trend in Cyber Frauds and Malware

laptop that says danger

Computer viruses and malware have been around for a long time, and cybercriminals have always tried to package their malevolent doings under a veil of deception. One method that has been in place for a while now is called scareware. Often disguised as something that appears to want to help your computer, scareware will scam users into paying for a service that isn't beneficial.

0 Comments
Continue reading

Prevent your Web Browser from Storing Passwords

typing in username and passwordFor sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200