CR-T Blog

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

Massive Workloads Call for Multiple Monitors

Posted by on in IT Blog

b2ap3_thumbnail_dual_monitors_400.jpgWhen life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking up multiple monitors. With too many windows open, your desktop becomes cluttered and your workflow impeded. Stop getting lost in your work and hook up an extra screen today!

Last modified on

The Heartbleed Fallout

Posted by on in IT Blog

b2ap3_thumbnail_heartbleed_fallout_400.jpgLast week, the Heartbleed bug was identified as a weakness in the OpenSSL cryptographic library, potentially leaking two-thirds of the Internet's secure information from any websites utilizing this encryption style. While most major websites such as Google, Yahoo, and Facebook released patches quickly, it does little to actually remediate the problem. Your data could have been leaked over the year-plus that the vulnerability could have been accessed. There is no way to know if it has been compromised.

Last modified on

What’s the Secret to Multitasking?

Posted by on in IT Blog

b2ap3_thumbnail_multitask_400.jpgYou may think that you're awesome at multitasking, but according to cognitive psychologist Art Markman, "You are your own worst judge of how good a multitasker you are." This is because the same areas of your brain that monitor performance are the same areas activated by multitasking, which means that it's difficult to accurately evaluate your own performance.

Last modified on

b2ap3_thumbnail_bleeing_heart_one_400.jpgOn April 7th, a new bug on the Internet was discovered that's putting millions of users' personal data at risk. Given the name "Heartbleed bug," it's capable of allowing infiltrators to collect information while you are securely browsing a SSL/TLS website. Since SSL/TLS is so widely used, it's very probably that your personal data is at risk.

Last modified on

Wearable Technology Just Got a Facelift

Posted by on in IT Blog

b2ap3_thumbnail_wearable_tech_all_the_rage_400.jpgWearable technology has dominated the tech headlines lately, and for good reason. The concept of having smart technology so easily accessible at any time is an attractive feature for many people. Some are patiently waiting for the public release of Google Glass later this year, along with many more attractive wearable technology options being released including Google's Android Wear.

Last modified on

Archive

Categories

Tag Cloud

Fax Server Gaming Console Privacy Vendor Management Innovation PowerPoint Law Firm IT Streaming Media Touchscreen Unified Threat Management Windows Congratulations Productivity Going Green Apple Router Computer Accessories Android Spam Workplace Tips Operating System Bluetooth Managed Service Providers Cloud IT Consultant Marketing Outlook Wearable Technology File Sharing Business Continuity Data Leadership Smartphone Virus Hackers Customer Relationship Management IT Support Remote Monitoring Saving Money Printer Facebook Best Practice Microsoft Office Email Mobile Office Office Admistrator Remote Computing Content Filtering Analytics Scheduling Quick Tips Security Phone Systems Work Station Tech Support User Tips Maintenance Twitter Java Mobile Device Management Firewall IT Solutions Thank You iPhone Mobile Device Bring Your Own Device Application Efficiency Backup Inbound Marketing Piracy Smartphones Hard Drives Upgrade 3D Health Managed Service Provider Internet Browser Remote Support Phone System Hardware Miscellaneous Mobile Devices Server Mobile Computing Network WiFi Administration Display Saving Time Value Point of Sale Computer Tutorials Small Business Information Technology Holiday PC Care Webinar Business Intelligence Humor Web Marketing IT Services Document Management Social Networking Lithium-ion Battery Business Computing The Cloud Gadgets Scam Help Desk Current Events Conferencing Business Management The Internet of Things Social Antivirus Sports Users BYOD Outsourcing Best Practices Tools Text Messaging Excel Virtualization Software User Error Trending Mobile App Hosted Solutions Mouse Trojan Technology Passwords Windows 8 Communication Disaster Recovery Macro Webcam Google Recycling Gadget VOIP Malware It Issues IBM Alerts VPN Apps Social Media Augmented Reality Computer Repair Video Surveillance Print Server Avoiding Downtime Wireless Technology ebay Microsoft Training Keyboard Shortcuts History Co-managed IT Digital Payment

Twitter

Latest Blog Entry

Massive Workloads Call for Multiple Monitors
When life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking ...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at CR-T!

Read more...

Contact Us

Learn more about what CR-T can do for your business.

callphone

Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#