CR-T Blog

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

The Only Good Virus is No Virus

Posted by on in IT Blog

b2ap3_thumbnail_antivirus_shield_400.jpgThis world is dangerous; there are murderers, serial killers, and identity thieves. These dangerous criminals aside, many people ignore the digital world and find solace in thinking that they are untouchable in their online community. Little do they know, some of the most dangerous criminals in the world exist on the other end of a telephone line, sitting in front of a computer: Hackers. One of the easiest ways to shield yourself from these criminals is to keep your antivirus up to date.

Last modified on

Don’t Fear New Technology’s Learning Curve!

Posted by on in IT Blog

b2ap3_thumbnail_you_will_be_ok_400.jpgWe are creatures of habit. We love our routines and live in "comfort zones." Getting anybody to do anything outside of their comfort zone is always challenging. A comfort zone typically applies to social situations, but it can also apply to technology. Don't let an emotional attachment to old technology keep you from taking advantage of new money-making solutions!

Last modified on

The Anatomy of an IT Perfect Game

Posted by on in IT Blog

b2ap3_thumbnail_it_perfect_game_400.jpgThe first pitch of another Major League Baseball season is being thrown this afternoon and with 2,427 more games on the docket in the regular season, it won't be the last. One of the greatest feats a player (or a team) can accomplish in baseball is by throwing a perfect game. To do so, a team's pitcher (or pitchers) must complete nine innings without allowing a baserunner.

Last modified on

Bluetooth: 20 Years Down, Many More to Come

Posted by on in IT Blog

b2ap3_thumbnail_bluetooth_is_20_400.jpgThere's been a lot of exciting talk lately about brand new technology including biometrics, smart appliances, and wearable technology. With all of this kind of buzz, it's easy to forget about older technology, even if it still provides value to the industry. Bluetooth technology is one of the most exceptional technologies of recent history, and it's celebrating its 20th birthday this year!

Last modified on

How to Prevent and Respond to Stolen Smartphones

Posted by on in IT Blog

b2ap3_thumbnail_cellphone_security_400.jpgIf you've ever had your smartphone stolen, you can attest to the frustration and potential risk that it brings. Many organizations and legislators are working to muzzle the issue, and there are steps that you can personally take to help prevent your device from being stolen. Let's take a look at how to prevent smartphone theft, and how to respond if your gadget is stolen.

Last modified on

Login

Latest Blog Entry

Massive Workloads Call for Multiple Monitors
When life throws you for a loop and you are contracted with much more work than you are used to, perhaps it is time to upgrade your workstation. One of the simplest ways you can do this is by hooking ...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at CR-T!

Read more...

Contact Us

Learn more about what CR-T can do for your business.

callphone

Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#