Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Foldable Screens Enter Smartphone Market

Foldable Screens Enter Smartphone Market

There have been whispers for years about manufacturers using flexible OLED (organic light-emitting diode) displays to create devices that were flexible enough to fold in half. As late as 2018, that’s all they were...whispers. In the subsequent year, to the surprise of many industry professionals, several manufacturers have committed to creating foldable devices. We’ll look at the technology behind these devices and tell you about which foldable devices are going to be available in 2019.

0 Comments
Continue reading

Have Any of These New Phones Made It on to Your Wish List?

Have Any of These New Phones Made It on to Your Wish List?

The new smartphone models are here. This year there are plenty for consumers to get excited about in the smartphone space. The return of the Galaxy Note, the evolution of the Galaxy s8, a premium iPhone, and the return of two of the industry's heavy hitters highlight this year’s best smartphones.

0 Comments
Continue reading

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

0 Comments
Continue reading

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

0 Comments
Continue reading

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Malware Business Computing Hosted Solutions Computer Network Security Productivity Software Google Internet Tech Term Communication Data Small Business Mobile Devices Efficiency IT Services Ransomware Backup Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Data Recovery IT Support Microsoft Office Android Saving Money Productivity Office 365 Upgrade Social Media Managed IT Services Information Gmail Windows Data Management Facebook Browser Users Business Continuity Internet of Things Word Managed IT Services Innovation Mobile Device Data Backup Server Phishing Smartphones Disaster Recovery Outsourced IT Passwords App Windows 10 Miscellaneous Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship VoIP Encryption Network Chrome Vulnerability Cybersecurity communications Artificial Intelligence Managed Service Government Money Apps Infrastructure BYOD Applications Save Money Office Tips Virtual Reality Apple Hacker Gadgets Content Filtering Analytics Tip of the week IT Support Spam Big Data Website Robot Risk Management Wireless Printing Automation Access Control Router Firewall Development Augmented Reality IT Management Customer Service WiFi Avoiding Downtime Maintenance Settings The Internet of Things Two-factor Authentication Paperless Office Virtualization Data storage Tablet Display Bandwidth Antivirus YouTube Unified Threat Management Employee-Employer Relationship VPN Education Data Security IBM Data loss Business Technology Mobile Device Management Chromebook Virtual Private Network HIPAA Administration Operating System Collaboration End of Support Hacking Customer Relationship Management Server Management Wi-Fi Computing Bring Your Own Device Laptop Password OneNote Document Management Google Drive Touchscreen Mouse Vendor Management Telephone Systems Mobile Security Presentation Safety LiFi Computers Office Quick Tips Storage Downtime Scam Wireless Technology Recovery Retail Hosted Solution SaaS Solid State Drive Business Intelligence Networking Outlook Monitors Hard Disk Drive Search Holiday Company Culture Typing Students Cabling Computing Infrastructure Dongle Recycling Human Error Firefox Smart Technology Motherboard BDR Servers Permissions Assessment Legislation Experience Identity Unified Communications Digital Payment Deep Learning Humor MSP Scalability User FCC Running Cable Smart Tech Hacks PowerPoint Updates Refrigeration Politics Managing Stress Managed Services Network Management Cryptocurrency Mixed Reality Managed IT Alerts Virtual Desktop Service Level Agreement Budget eWaste Device Techology Distributed Denial of Service Public Speaking Google Maps Fraud Buisness Internet Exlporer How To LED Digital Lenovo Comparison Competition Private Cloud sip Migration Lithium-ion battery Title II Connectivity Onboarding Mail Merge SharePoint IT solutions Tech Support Cables Laptops File Sharing Bitcoin Network Congestion Slack Data Breach Disaster Shortcut Licensing Computer Care Continuity Mobility Unified Threat Management Managed IT Service Modem Statistics 5G Value Samsung Information Technology Smart Office Co-Managed IT Spyware Superfish Specifications Compliance Best Practice telephony Charging Online Halloween IoT Writing Digital Signage GDPR Address Downloads Cortana Undo IT Technicians Websites Identity Theft Google Docs Wires Software as a Service Windows 8 Monitoring Hard Disk Drives Uninterrupted Power Supply Patch Management Marketing Fun Cooperation Training Solar Print Toner User Error Break Fix Cookies Messaging Bluetooth Application Hotspot Professional Services G Suite Google Wallet Work Content Black Friday Regulations Automobile Business Growth Microsoft Excel Scary Stories Star Wars Current Events Desktop Data Warehouse Corporate Profile Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Nanotechnology Spying Solid State Drives Staff Legal Shortcuts VoIP IP Address Dark Web Cybercrime Alt Codes Dark Data Analysis Employee-Employer Relationships Language USB Drones Optimization Streaming How To Cyber Monday Social Networking Blockchain Sports Cost Management Remote Computing Going Green Social Engineering Troubleshooting WannaCry Google Calendar Knowledge Chatbots FinTech iOS IT service Heating/Cooling Mobile Office Net Neutrality Screen Reader Update Social National Security Business Analysis Printer Hard Drives Wearable Technology Security Cameras Time Management IT Consultant Unsupported Software Domains Computer Repair Processors Cameras Printers Relocation Meetings Tracking Cleaning Mobile Data Health Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Windows 7 Error Black Market Point of Sale Mobile Computing Travel Law Enforcement Physical Security Regulation Notifications Upgrades CrashOverride Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS