Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Network Security Internet Google Tech Term Productivity Microsoft Software Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Windows 10 Hardware Ransomware Android Smartphone Data IT Support Saving Money Workplace Tips Productivity Managed IT Services Data Management Browser Microsoft Office Server Business Continuity Upgrade Managed IT Services Internet of Things Gmail Cloud Computing Windows Facebook Data Recovery Office 365 Phishing Disaster Recovery Word Innovation Data Backup App Passwords Users Artificial Intelligence Remote Monitoring Outsourced IT Smartphones Managed Service Provider Employer-Employee Relationship VoIP Mobile Device Windows 10 Encryption Cybersecurity Business Management Spam IT Support Big Data Website communications BYOD Miscellaneous Applications Infrastructure Social Media Money Information Tip of the week Vulnerability Office Tips Network Chrome Analytics Government Content Filtering Display Bandwidth Router YouTube Robot Risk Management Employee-Employer Relationship IT Management Wireless Printing Managed Service Automation Maintenance Virtual Reality Firewall Customer Service Tablet Paperless Office WiFi Save Money Avoiding Downtime Antivirus The Internet of Things Hacker Settings Apple Two-factor Authentication Data storage Access Control Data loss Business Technology Virtual Private Network Outlook Business Intelligence Monitors Server Management Search Education IBM Mobile Security Document Management Touchscreen Apps Company Culture Operating System Mobile Device Management Telephone Systems Administration Customer Relationship Management End of Support Hacking Quick Tips Wi-Fi Computing Google Drive Scam Laptop Password Development Augmented Reality Mouse Vendor Management SaaS Presentation LiFi Networking Safety Computers Office VPN Holiday Storage Gadgets Downtime Unified Threat Management Wireless Technology Recovery Data Security HIPAA Retail Virtualization Hosted Solution Legal IP Address Cybercrime Alerts Service Level Agreement Digital Payment Work Content BDR Servers Distributed Denial of Service Voice over Internet Protocol Fraud Internet Exlporer Alt Codes Politics Dark Data Desktop Network Management Comparison Chromebook Drones Knowledge Title II Connectivity Spying Techology Sports SharePoint Going Green Collaboration Social Engineering Shortcuts Managed IT Modem Analysis Digital Lenovo Mobile Office Licensing Social Hard Drives Optimization Streaming Google Maps Managed IT Service FinTech Mail Merge Value Typing Tech Support Troubleshooting Specifications Compliance Experience Unified Communications Online IoT Deep Learning Humor Computer Care Unified Threat Management Downloads IT Technicians File Sharing Security Cameras Disaster Shortcut Break Fix Cookies Samsung User Spyware Superfish Running Cable Cooperation Hacks Refrigeration Recycling Human Error Statistics Public Speaking MSP Address Hotspot Professional Services Cryptocurrency Websites Identity Theft Virtual Desktop Black Friday Regulations Budget Patch Management Microsoft Excel Star Wars Bring Your Own Device sip Training PowerPoint User Error Buisness Multi-Factor Security Mirgation How To Competition Managing Stress Managed Services Uninterrupted Power Supply Dark Web Nanotechnology G Suite Lithium-ion battery Staff Automobile eWaste Device Bluetooth IT solutions Corporate Profile Language USB Bitcoin Network Congestion LED Cyber Monday Social Networking Solid State Drive Blockchain Cost Management Best Practice telephony Onboarding VoIP 5G Google Calendar Chatbots Information Technology Cables Laptops Net Neutrality Screen Reader Google Docs Slack How To Halloween Printer Wearable Technology Writing Undo Continuity Mobility Cortana Charging WannaCry Computing Infrastructure Dongle Windows 8 Marketing Smart Office Co-Managed IT IT service Heating/Cooling Fun Smart Technology Motherboard Remote Computing Software as a Service Hard Disk Drive Permissions Assessment Business Growth Application Digital Signage Time Management Legislation Identity Update Google Wallet Wires FCC Smart Tech Monitoring Firefox Scary Stories Current Events Solar Print Toner Cabling Processors Cameras Regulation Relocation Entertainment Tracking Meetings 3D Printing Cleaning Health Alert CCTV Private Cloud Emoji Webcam Unsupported Software Domains Work/Life Balance Electronic Medical Records Error Printers Black Market Point of Sale Mobile Data Law Enforcement Travel Notifications CrashOverride Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Mobile Computing Administrator Web Server Physical Security Emergency Machine Learning IT Budget GPS Upgrades IT Consultant Computer Repair