Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Police Recruit Eagles to Take Out Illegal Drones... Seriously

b2ap3_thumbnail_eagles_for_drones_400.jpgWhile they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Internet Hosted Solutions Network Security Productivity Google Software Tech Term Communication Mobile Devices Efficiency IT Services Data Small Business Backup Hardware Smartphone Ransomware Workplace Tips Windows 10 IT Support Android Productivity Microsoft Office Saving Money Data Management Cloud Computing Browser Data Recovery Managed IT Services Business Continuity Innovation Managed IT Services Internet of Things Gmail Data Backup Windows Facebook Server Users Upgrade Office 365 Word Disaster Recovery Outsourced IT Smartphones Passwords Windows 10 App Phishing Social Media Employer-Employee Relationship Managed Service Provider VoIP Mobile Device Business Management Encryption Vulnerability Cybersecurity Network Artificial Intelligence Chrome Remote Monitoring communications Save Money Information Apple Government Applications Tip of the week Analytics Office Tips IT Support BYOD Spam Hacker Website Money Content Filtering Big Data Miscellaneous Infrastructure Managed Service Paperless Office Risk Management IT Management Wireless Firewall Access Control Maintenance WiFi Router Avoiding Downtime The Internet of Things Customer Service Tablet Data storage Display Antivirus Virtualization Settings Two-factor Authentication Robot Printing Bandwidth YouTube Automation Virtual Reality Employee-Employer Relationship Education IBM Touchscreen Hacking Google Drive Password Mouse Vendor Management SaaS Mobile Device Management Telephone Systems Administration Customer Relationship Management Development HIPAA LiFi Quick Tips Unified Threat Management Wi-Fi Presentation Computers Holiday Scam Laptop Storage Retail Office Augmented Reality Gadgets Chromebook Solid State Drive Wireless Technology Recovery Networking Safety Mobile Security Outlook Document Management Downtime Hard Disk Drive VPN Monitors Data Security Business Intelligence Hosted Solution Data loss Business Technology Operating System Virtual Private Network Apps End of Support Company Culture Computing Server Management Search Public Speaking MSP Printer Scalability Wearable Technology Net Neutrality Screen Reader Mail Merge Experience Managing Stress Unified Communications Managed Services Computing Infrastructure Dongle Unified Threat Management PowerPoint Smart Technology Motherboard Disaster Shortcut Bitcoin Competition Network Congestion Spyware Superfish Information Technology Running Cable Legislation Identity Statistics Best Practice telephony eWaste Device Permissions Assessment Address Writing Migration Google Docs Remote Computing Virtual Desktop LED FCC Smart Tech Cables Laptops Alerts Service Level Agreement User Error Update Buisness Onboarding Distributed Denial of Service Uninterrupted Power Supply Patch Management Windows 8 Google Wallet Lithium-ion battery Slack Comparison Bluetooth Business Growth Undo Continuity IT solutions Mobility Fraud Internet Exlporer Corporate Profile Current Events Digital Payment Charging SharePoint Marketing Smart Office Co-Managed IT Title II Connectivity Wires Software as a Service Licensing VoIP Application Legal 5G Digital Signage Managed IT Service Modem Politics How To Drones Collaboration Halloween Monitoring Specifications Compliance Alt Codes Dark Data Cortana Solar Print Toner Value WannaCry Going Green Social Engineering Downloads Messaging IT Technicians IT service Heating/Cooling Fun Work Content Online IoT Tech Support Voice over Internet Protocol Entertainment Cooperation Time Management Desktop Break Fix Cookies Social Professional Services Firefox File Sharing Scary Stories Spying Black Friday Regulations Cabling Typing Computer Care Shortcuts Hotspot IP Address Cybercrime Analysis Multi-Factor Security Employee-Employer Relationships Mirgation BDR Servers Deep Learning Hard Drives Humor Samsung Optimization Streaming Microsoft Excel Star Wars Websites Identity Theft FinTech iOS Staff Network Management Troubleshooting Dark Web Nanotechnology Hacks Security Cameras Language USB Techology Budget Sports Cyber Monday Social Networking Managed IT Cryptocurrency Training Knowledge Digital User Lenovo How To Automobile Mobile Office Google Calendar Students Chatbots Google Maps Bring Your Own Device Refrigeration sip G Suite Recycling Human Error Blockchain Cost Management Botnet Supercomputer Twitter Printers Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Mobile Computing Machine Learning IT Budget Web Server Physical Security GPS CrashOverride Upgrades Computer Repair IT Consultant Relocation Windows 7 Processors Cameras Tracking Meetings 3D Printing Health Cleaning Emergency Private Cloud Regulation Alert CCTV Emoji Webcam Unsupported Software Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Domains Mobile Data Travel Law Enforcement Notifications