Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: SSID

Tech Term: SSID

When you work with technology as much as we do, there’s a bit of lingo that you pick up here and there. Of course, we then have a habit of using the terminology that we’ve picked up all the time, forgetting that not everyone has the same experience that we do. One word that causes this a lot is SSID. Here, we’ll discuss what we’re referring to when we use this term.

0 Comments
Continue reading

Tech Terminology: PDF

Tech Terminology: PDF

Today, while the world is still effectively split between PCs and Macs, we have at least one file format that bridges the divide: the PDF. This file format became standard in business communications, and is now used the world over. Today, we’ll dive into the history of the Portable Document Format and why it is so well-suited to business processes.

0 Comments
Continue reading

Tech Terminology: Print Toner

Tech Terminology: Print Toner

Businesses all over the world are making strides to limit printed documents if they aren’t needed, and a large part of this is that printers require a lot of specific resources. Depending on the model, a printer might need ink, but the laser printers require a product called “toner” to work as intended. This week’s tech term is dedicated to the difference between ink and toner, as well as which one you’ll need for your specific printer.

0 Comments
Continue reading

Tech Terminology: Mobile Device Management

Tech Terminology: Mobile Device Management

Smartphones and tablets are a double-edged sword for businesses: on one hand, they are a great money saver if an employee is willing to use their own for business purposes, but this does leave your business vulnerable in a few ways. Fortunately, if the benefits are something you’re interested in, these vulnerabilities are simple enough to shore up with something called mobile device management.

0 Comments
Continue reading

Tech Terminology: Troubleshooting

Tech Terminology: Troubleshooting

People use computers for almost everything nowadays. However, when they don’t work as intended it can be endlessly frustrating. Whether you have hardware that isn’t properly connecting, or you have software that isn’t responding the way it normally does, many times before you call for assistance there are things you can do to try and fix the problem, or at the very least, understand what the issue is. This process is called troubleshooting. Today, we’ll take a look at what it means to properly troubleshoot computer issues, and when it is your responsibility to look to the professionals as to not cause more problems than when you started.

0 Comments
Continue reading

Tech Terminology: Authentication

Tech Terminology: Authentication

Authentication isn’t an unfamiliar aspect in everyday life. Driver’s licenses, library cards, and PIN numbers are all forms of identity authentication. However, as computers have become a cornerstone of everyday life, the most commonly-used way to confirm one’s identity has almost assuredly become the username/password login combination. Today, we’ll take a deeper dive into what authentication is.

0 Comments
Continue reading

Tech Terminology: Network

Tech Terminology: Network

Network is a word that’s commonly seen in the office environment in many different ways. In particular, you’re likely to hear about network security, network maintenance, social networking, and network switches, but what does it all mean? In this week’s tech term, we’re going to address what a network is and how it works to tie your business together.

0 Comments
Continue reading

Tech Terminology: Processor

Tech Terminology: Processor

The word “computer” actually originated in the 1600s, when it was used to describe a person who carries out calculations and the requisite processes. Today, those processes are carried out mechanically. Let’s examine the piece of the computer that allows it to do so, the CPU.

0 Comments
Continue reading

Tech Terminology: Business Intelligence

Tech Terminology: Business Intelligence

If you know more about your organization and its customers, you’ll be able to make better decisions about the future of your business. Thanks to an increased focus on business intelligence, even small and medium-sized businesses can take advantage of these analytical tools to improve operations and customer relations. What is business intelligence? How does it work, and why does your business need it?

0 Comments
Continue reading

Tech Terminology: USB-C

Tech Terminology: USB-C

We often take for granted that people know what we are talking about when we talk about popular connectors, but really how do these systems work? For this week’s tech term, we are going to take a look at something we all have used and probably are actively using: the Universal Serial Bus (USB). We will take a look at the origins of this technology, the development of it, and how it is being used today.

0 Comments
Continue reading

Tech Terminology: Chromebook

Tech Terminology: Chromebook

Chromebooks are a pretty common device at this point, and this popularity only makes sense. For many, the Chromebook offers basic features that serve their purposes well, but there are those who wouldn’t be satisfied with their capabilities. This week, our Tech Term is Chromebook, so let’s take a closer look to gain a deeper understanding of them.

0 Comments
Continue reading

Tech Term: Bandwidth Defined

Tech Term: Bandwidth Defined

The Internet has become an irreplaceable part of many business’ operations, which brings the thought into question of how much you rely on it for your daily duties. Technology has changed the way that the Internet works for the better, but there is one part of its operations that still lies at the heart of it: bandwidth.

0 Comments
Continue reading

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

0 Comments
Continue reading

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

0 Comments
Continue reading

Tech Term: An Introduction to Proxy Servers

Tech Term: An Introduction to Proxy Servers

There are plenty of technical terms and solutions that, while heard of frequently enough, it may not be completely clear what they mean or refer to. A proxy server is an excellent example of such a solution. This week, we’ll examine this tech term and review how utilizing proxy servers can help your business.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Malware Business Computing Network Security Hosted Solutions Computer Productivity Software Google Internet Tech Term Communication Data Small Business Mobile Devices Efficiency IT Services Ransomware Backup Workplace Tips Hardware Windows 10 Cloud Computing Smartphone Android Data Recovery IT Support Microsoft Office Saving Money Productivity Upgrade Office 365 Social Media Gmail Managed IT Services Data Management Windows Facebook Users Browser Information Business Continuity Word Data Backup Internet of Things Innovation Managed IT Services Server Phishing Mobile Device Miscellaneous Disaster Recovery Smartphones Passwords App Outsourced IT Windows 10 communications Vulnerability Employer-Employee Relationship Managed Service Provider Artificial Intelligence Cybersecurity VoIP Encryption Network Remote Monitoring Chrome Business Management BYOD Analytics Apps Tip of the week IT Support Applications Money Virtual Reality Office Tips Gadgets Infrastructure Managed Service Hacker Spam Website Content Filtering Save Money Government Big Data Apple Education Data storage Access Control Tablet Risk Management Display Router Wireless Antivirus Firewall VPN Robot Printing WiFi Avoiding Downtime Customer Service Augmented Reality Automation Paperless Office The Internet of Things Employee-Employer Relationship Settings Virtualization Two-factor Authentication Unified Threat Management IT Management Bandwidth Maintenance YouTube Development OneNote Quick Tips Storage Collaboration Retail Scam Search HIPAA IBM Document Management Hacking Solid State Drive Administration Networking Mobile Device Management Outlook Customer Relationship Management Monitors Hard Disk Drive Wi-Fi Data Security Laptop Business Intelligence Mobile Security Presentation Data loss Business Technology Operating System Virtual Private Network Office End of Support SaaS Wireless Technology Computing Safety Bring Your Own Device Company Culture Recovery Google Drive Server Management Password Mouse Vendor Management Holiday Touchscreen Downtime Hosted Solution LiFi Telephone Systems Computers Chromebook Computing Infrastructure Dongle Knowledge Google Wallet Onboarding Smart Technology User Error Motherboard Sports Business Growth Cables Laptops Uninterrupted Power Supply Patch Management Current Events Slack Data Breach Legislation Identity Mobile Office Private Cloud Continuity Mobility Bluetooth Permissions Assessment Corporate Profile User Legal Tech Support Smart Office Co-Managed IT FCC Smart Tech Refrigeration Charging Alerts Service Level Agreement Public Speaking Experience Unified Communications Drones Computer Care Digital Signage GDPR VoIP Distributed Denial of Service Alt Codes Dark Data File Sharing Wires Software as a Service Going Green Social Engineering Samsung Monitoring Hard Disk Drives How To Comparison Running Cable Solar Print Toner Fraud Internet Exlporer Competition WannaCry SharePoint Websites Work Identity Theft Content Business Analysis IT service Heating/Cooling Title II Connectivity Virtual Desktop Social Messaging Licensing Training Desktop Data Warehouse Time Management Managed IT Service Modem Buisness Typing Voice over Internet Protocol Entertainment IT solutions G Suite Spying Solid State Drives Firefox Specifications Compliance Lithium-ion battery Deep Learning Humor Automobile Shortcuts Cabling Value Analysis Employee-Employer Relationships Downloads IT Technicians Optimization Streaming BDR Servers Online IoT Undo Hacks Cooperation Budget Troubleshooting Network Management Break Fix Cookies Marketing 5G Cryptocurrency FinTech iOS Cortana How To National Security Black Friday Techology Regulations Application Halloween sip Security Cameras Managed IT Hotspot Professional Services Remote Computing Students Digital Multi-Factor Security Lenovo Mirgation Recycling Human Error Google Maps Microsoft Excel Star Wars Fun Mail Merge Staff Dark Web Nanotechnology Bitcoin Network Congestion Update MSP Scalability Information Technology PowerPoint Updates Cyber Monday Unified Threat Management Social Networking Scary Stories Best Practice telephony Managing Stress Managed Services Disaster Shortcut Language USB Writing Mixed Reality Spyware Google Calendar Superfish Chatbots IP Address Cybercrime Google Docs eWaste Digital Payment Device Statistics Blockchain Cost Management Printer Address Wearable Technology Politics LED Net Neutrality Screen Reader Hard Drives Windows 8 Migration Domains Upgrades Cleaning Health Alert CCTV CrashOverride Emoji Webcam Windows 7 3D Printing Work/Life Balance Electronic Medical Records Error Emergency Black Market Point of Sale Regulation Unsupported Software Law Enforcement Travel Notifications Botnet Supercomputer Twitter Mobile Data Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Web Server Machine Learning IT Budget GPS Printers IT Consultant Computer Repair Mobile Computing Processors Cameras Relocation Physical Security Tracking Meetings