Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Figuring Out Why Your Sound Isn’t Working

Tip of the Week: Figuring Out Why Your Sound Isn’t Working

Do you know what’s just as jarring as your computer’s volume suddenly being way too high? Suddenly not having any volume at all. Sound problems on your computer can be a real pain, especially if you have something important you need to listen to for one of your responsibilities. Here, we’re offering some tips to help you do some basic sound troubleshooting.

0 Comments
Continue reading

Why a Chromebook Can Be a Great Investment

Why a Chromebook Can Be a Great Investment

Chromebooks have provided businesses with a different option for their computing needs, if it fits with their practices. Here, we’ll explore the different factors that make Chromebooks a good choice, and some of the more appealing features that they can provide.

0 Comments
Continue reading

Tip of the Week: Handy Browsing Shortcuts

Tip of the Week: Handy Browsing Shortcuts

When so much of the day is spent working on the computer, it can be argued that efficiency is paramount to productivity. The faster you are able to do things, the more you could potentially get done. This is how shortcuts work: while the changes are incremental, they add up. For this week’s tip, we’ll go over a few such shortcuts.

0 Comments
Continue reading

Windows 7 is Approaching End-of-Life

Windows 7 is Approaching End-of-Life

If you’re reading this on a computer that’s currently running Windows 7, I have some bad news: the End-of-Life date for this version is approaching. What does this mean for your business and the workstations that support it? Read on to find out.

0 Comments
Continue reading

Tip of the Week: 5 Foundational Pieces to Computing Securely

Tip of the Week: 5 Foundational Pieces to Computing Securely

Every so often, it can be good to get back to basics for a bit of review. That’s why we’re going over five ways that you can improve your security through basic best practices for this week’s tip!

0 Comments
Continue reading

Tech Terminology: Processor

Tech Terminology: Processor

The word “computer” actually originated in the 1600s, when it was used to describe a person who carries out calculations and the requisite processes. Today, those processes are carried out mechanically. Let’s examine the piece of the computer that allows it to do so, the CPU.

0 Comments
Continue reading

Power Off, or Leave It On?

Power Off, or Leave It On?

At the end of the day, do you shut down your computer or do you put it into sleep mode? Depending on what you need from your device the next day, you might want to consider which option benefits you the most. Here are some of the pros and cons of both approaches so that you can pick which one best suits your situation.

0 Comments
Continue reading

Tech Term: Motherboard

Tech Term: Motherboard

A computer is made up of many parts, one of which is today’s Tech Term: the motherboard. We’ll discuss what the motherboard does for your computer and why it’s such an important part for its continued operation.

0 Comments
Continue reading

Businesses that Value Mobility Will Want to Adopt 2-in-1 Devices

Businesses that Value Mobility Will Want to Adopt 2-in-1 Devices

Businesses today rely heavily on software solutions to function, and so these solutions need to be on-hand whenever and wherever a business opportunity may arise. As a result, mobile solutions have risen in importance, despite the continued need for what a desktop has to offer. To meet both these requirements, we recommend a convertible ultrabook, also known as a 2-in-1 device.

0 Comments
Continue reading

Tip of the Week: Use this Free PC Tool to Find Out Which Files You Should Delete Next

Tip of the Week: Use this Free PC Tool to Find Out Which Files You Should Delete Next

Fact: your PC has a limited amount of storage space. When a user runs out of space or comes close to it, they need to come up with a solution. Without taking any action, performance will lag and saving data for future projects will be impossible. By using a helpful tool like WinDirStat, you can free up space by easily identifying and then taking action with your PC’s biggest files.

0 Comments
Continue reading

Tip of the Week: Optimize Your Computer By Taking Care of the Clutter

Tip of the Week: Optimize Your Computer By Taking Care of the Clutter

Do you remember the day that you purchased your current workstation? Maybe it was last week, last month, last year, or several years ago. At one point, it was pristine, untouched by the demands of the workday, but those days have long since passed. Over time, your computer collects all sorts of stuff on it, from unnecessary files to outdated, unused software.

0 Comments
Continue reading

Tip of the Week: 1GB, 2GB, 4GB or More - How Much RAM Do You Actually Need?

Tip of the Week: 1GB, 2GB, 4GB or More - How Much RAM Do You Actually Need?

You can tell when a workstation might need an upgrade if it’s slowing down, or if the machine is so absurdly slow that you can barely accomplish your daily tasks with it. One of the easiest ways you can improve the quality of your workstation is by increasing the amount of RAM.

0 Comments
Continue reading

Tip of the Week: How to Clean Your Monitor, Keyboard, and the Inside of Your PC

b2ap3_thumbnail_clean_computer_tips_400.jpgA clean computer is a happy computer. Just like any other piece of gadgetry, a computer requires regular cleanup sessions that allow users to get the most from them. In fact, January is known as Clean Up Your Computer Month, so what better way is there to ring in the new year than making sure your computer is in tip-top shape?

0 Comments
Continue reading

Tip of the Week: 3 PC Best Practices You Need to Know

b2ap3_thumbnail_pc_practices_400.jpgSometimes the best thing you can do for yourself is return to the basics. For example, you can know all of the keyboard shortcuts in the world, but that doesn’t help you properly shut down your computer. Here are three tips for every computer user who wants to make sure that they’re using PC best practices.

0 Comments
Continue reading

Tip of the Week: Spot a Hacker By Investigating Their IP Address

b2ap3_thumbnail_ip_addresses_400.jpgHave you ever wondered how your PC is identified from the billions of devices out there in the world today? Just like every human being has specific physiological traits that make up who they are, your computer’s IP address is somewhat unique to your machine, and it can say a lot about you. Therefore, it’s important that you are able to identify your own IP address when you need to.

0 Comments
Continue reading

Nanotechnology Holds the Key to Doubling Computing Power

b2ap3_thumbnail_ibm_processor_400.jpgEarly in July, IBM announced that they have developed an ultra-dense computer chip that has roughly four times the computing capacity of today’s most powerful chips. These prototype chips, and ones they will develop to fuel computing into the next decade and beyond, are the result of the evolution of 21st century informatics.

0 Comments
Continue reading

Free Tool Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_pc_wifi_hot_spot_400.jpgWe’ve all had those moments where you desperately need a WiFi signal. Without one, how will you check your email? If you have a PC with a wireless card, you can take advantage of Connectify to turn your PC into a WiFi repeater, effectively extending your hotspot’s signal. With everyone looking to take advantage of wireless technology, a WiFi signal is necessary; so here’s how to make it a little better.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Productivity Google Hosted Solutions Internet Network Security Software Tech Term Communication Mobile Devices Efficiency IT Services Data Small Business Backup Hardware Smartphone Workplace Tips Windows 10 Ransomware Android IT Support Productivity Microsoft Office Saving Money Browser Managed IT Services Business Continuity Data Recovery Data Management Cloud Computing Gmail Office 365 Innovation Internet of Things Facebook Managed IT Services Server Users Upgrade Windows Word Data Backup Passwords Disaster Recovery Smartphones Outsourced IT Windows 10 App Phishing Social Media communications Remote Monitoring Managed Service Provider VoIP Business Management Mobile Device Encryption Network Artificial Intelligence Vulnerability Chrome Cybersecurity Employer-Employee Relationship Money Content Filtering Big Data Managed Service Miscellaneous Infrastructure Information Save Money Spam Apple Government Website Analytics Office Tips BYOD IT Support Tip of the week Applications Hacker Firewall Robot Bandwidth Printing Virtual Reality Employee-Employer Relationship YouTube Automation WiFi Avoiding Downtime Paperless Office Education Risk Management The Internet of Things Wireless Virtualization IT Management Access Control Maintenance Customer Service Data storage Router Display Tablet Settings Antivirus Two-factor Authentication Hosted Solution Hard Disk Drive VPN Operating System Data Security Company Culture Data loss Business Technology End of Support Presentation Computing Virtual Private Network Search IBM SaaS Google Drive Office Password Gadgets Server Management Mouse Vendor Management Wireless Technology Touchscreen Recovery Development Mobile Device Management Administration Customer Relationship Management Unified Threat Management LiFi Holiday Telephone Systems Wi-Fi Computers Laptop HIPAA Storage Chromebook Augmented Reality Quick Tips Retail Scam Safety Apps Solid State Drive Outlook Document Management Mobile Security Hacking Downtime Networking Monitors Business Intelligence Online IoT IT service Heating/Cooling Analysis Employee-Employer Relationships Scary Stories Samsung Downloads IT Technicians WannaCry Typing Competition Optimization Streaming FinTech iOS IP Address Cybercrime Cooperation Deep Learning Humor Troubleshooting Websites Identity Theft Break Fix Cookies Time Management Hotspot Professional Services Cabling Training Black Friday Regulations Firefox Hacks Security Cameras Automobile Microsoft Excel Star Wars BDR Servers Budget Students Sports G Suite Multi-Factor Security Mirgation Cryptocurrency Recycling Human Error Knowledge Network Management How To MSP Scalability Mobile Office Staff Bring Your Own Device sip Undo Dark Web Nanotechnology Language USB Marketing Managed IT PowerPoint Cyber Monday Social Networking Techology Managing Stress Managed Services Unified Communications Blockchain Cost Management Google Maps Application Google Calendar Chatbots Digital Bitcoin Lenovo Network Congestion eWaste Device Experience Information Technology Migration Running Cable Remote Computing Printer Wearable Technology Best Practice Mail Merge telephony LED Net Neutrality Screen Reader Update Computing Infrastructure Dongle Disaster Shortcut Google Docs Onboarding Virtual Desktop Smart Technology Motherboard Unified Threat Management Writing Cables Laptops Permissions Assessment Statistics Slack Buisness Legislation Identity Spyware Windows 8 Superfish Continuity Mobility Google Wallet Charging Lithium-ion battery Business Growth Address Smart Office Co-Managed IT IT solutions Digital Payment FCC Smart Tech Software as a Service Alerts Service Level Agreement Uninterrupted Power Supply Patch Management Hard Drives Digital Signage Politics Distributed Denial of Service Current Events User Error Wires Collaboration Fraud Internet Exlporer Bluetooth Legal Monitoring 5G Comparison Solar Print Toner Drones Messaging Halloween SharePoint Corporate Profile Alt Codes Dark Data Work Content Cortana Title II Connectivity Voice over Internet Protocol Entertainment Licensing Refrigeration Desktop Fun Tech Support Managed IT Service Modem VoIP Going Green User Social Engineering File Sharing Value Spying Computer Care Specifications Compliance How To Social Public Speaking Shortcuts Unsupported Software Emergency Error Black Market Point of Sale Travel Law Enforcement Mobile Data Notifications Twitter Printers Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server Machine Learning IT Budget GPS Mobile Computing Computer Repair Physical Security IT Consultant Upgrades Windows 7 Processors Cameras Relocation Meetings Tracking Health Cleaning CrashOverride Domains 3D Printing Regulation Alert CCTV Private Cloud Emoji Webcam Electronic Medical Records Work/Life Balance