CR-T Blog

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_twenty_first_century_computing_400.jpgPeople in 1967 were fascinated with new technology. During this era, technology advanced so quickly in such a short amount of time that people looked in wonderment at the future and made wild predictions at what the 2000s would look like. How accurate were the predictions of the 1960's scientific community? Let's check in with Walter Cronkite to find out!

Last modified on

Signs Your Technology Might Be Older Than You

Posted by on in IT Blog

b2ap3_thumbnail_old_tech_signs_400.jpgWhen we think of technology in terms of age, we often look at how long the machine has lasted for. Some machines from the mid-90's are still running, which makes them almost twenty years old. In terms of human life, that's not a very long time, but if you look at it in terms of quality working conditions, you'll find that these computers are kind of like dogs and cats. They may only be several years old, but in terms of actual age, their lifespan makes them much older than you realize.

Last modified on

Massive Workloads Call for Multiple Monitors

Posted by on in IT Blog

b2ap3_thumbnail_dual_monitors_400.jpgWhen life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking up multiple monitors. With too many windows open, your desktop becomes cluttered and your workflow impeded. Stop getting lost in your work and hook up an extra screen today!

Last modified on

The Heartbleed Fallout

Posted by on in IT Blog

b2ap3_thumbnail_heartbleed_fallout_400.jpgLast week, the Heartbleed bug was identified as a weakness in the OpenSSL cryptographic library, potentially leaking two-thirds of the Internet's secure information from any websites utilizing this encryption style. While most major websites such as Google, Yahoo, and Facebook released patches quickly, it does little to actually remediate the problem. Your data could have been leaked over the year-plus that the vulnerability could have been accessed. There is no way to know if it has been compromised.

Last modified on

What’s the Secret to Multitasking?

Posted by on in IT Blog

b2ap3_thumbnail_multitask_400.jpgYou may think that you're awesome at multitasking, but according to cognitive psychologist Art Markman, "You are your own worst judge of how good a multitasker you are." This is because the same areas of your brain that monitor performance are the same areas activated by multitasking, which means that it's difficult to accurately evaluate your own performance.

Last modified on

Archive

Categories

Tag Cloud

Mobile Computing Avoiding Downtime Tutorials Business Intelligence Fax Server Alerts File Sharing Efficiency Best Practice Computer Repair Scheduling Excel Recycling Leadership Apps iPhone Health Scam Internet Security Help Desk Digital Payment Gadget Social Media Microsoft ebay Best Practices Outlook Managed Service Provider Conferencing Software Hardware Upgrade Remote Support Mobile Device Management Disaster Recovery Bluetooth Web Marketing Phone Systems Windows Current Events Innovation Saving Money Windows 8 VPN Small Business User Error Mobile Office Hackers Browser Wireless Technology Video Surveillance Going Green Apple IT Consultant Print Server Communication Humor Router Tech Support Webcam Workplace Tips Email App Information Technology Mobile Devices Sports Administration Outsourcing Streaming Media IBM The Internet of Things Tools Server Computer Accessories VOIP Twitter Value Quick Tips Congratulations Macro Customer Relationship Management Display It Issues Inbound Marketing Analytics BYOD PC Care Admistrator Co-managed IT Webinar Productivity Passwords Mouse Maintenance Bring Your Own Device Network Gaming Console Holiday Office Cloud Work Station Data Business Management Application Microsoft Office Google Remote Computing Android Virus Wearable Technology Phone System IT Services Augmented Reality Spam 3D Java Printer Business Computing Facebook Managed Service Providers PowerPoint Firewall IT Solutions Social Networking Piracy Mobile Virtualization Privacy Gadgets Social Marketing Hosted Solutions Touchscreen Training Trojan IT Support Keyboard Shortcuts Law Firm IT History Smartphones Operating System Backup Remote Monitoring Hard Drives Unified Threat Management Antivirus User Tips Trending Content Filtering Mobile Device Computer Technology Point of Sale Users Malware Business Continuity Smartphone WiFi Text Messaging Document Management Vendor Management The Cloud Thank You Saving Time Lithium-ion Battery Miscellaneous

Twitter

Latest Blog Entry

Complete Your 21st Century Home with a Computerized Communications Console!
People in 1967 were fascinated with new technology. During this era, technology advanced so quickly in such a short amount of time that people looked in wonderment at the future and made wild predicti...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at CR-T!

Read more...

Contact Us

Learn more about what CR-T can do for your business.

callphone

Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#