Need Computer Help?

Every Day Hundreds of Computers Get Compromised and Network Breached. Call us to Prevent that from Happening Again. Call 646 784 5651

Read More
  • Is your Windows PC Infected? Contact us to Fix It

    Is your Windows PC Infected? Contact us to Fix It

  • Is Your Mac Slow? We Have the Right Tools to Speed It Up

    Is Your Mac Slow? We Have the Right Tools to Speed It Up

Computer Repair

Computer Repair

We fix and build computers every day and we know what their major problems are: infections, overheating,blue screen of death, lack of backup. Nothing is a mystery for us !
Read More
Network Security

Network Security

Only few people know that many infections and attacks can be avoided with the proper network configuration. Contact us to know how we can be of help.
Read More
Mac Repair

Mac Repair

Macs are wonderful machines but very often tend to slow down throughout the years and do not perform well anymore. We have the right tools to clean them and speed them up.
Read More
IT Solutions

IT Solutions

Pc Doctor New York has a wide range of services, offering cloud services, computer back up, disaster recovery and every imaginable customized solution.
Read More

Time To Ditch Microsoft Office? Why Not !

lbre officeWith the world economy still faltering, some public administrators have brilliantly thought to ditch not only Windows but also Microsoft Office which is the most profitable line of business that Microsoft has.

Since the migration of the city of Munich in 2010 from Microsoft to Linux, many other cities and towns in Europe and in the US are embracing new reliable solutions based on open source products.

Read More

Symptoms of an Unclean Computer

clutterHow do we know if a computer is clean or not? Do we wait for it to slow down or do we really want to try to clean it up ourselves?

There are, however, several signs that can predict if the computer need help. Therefore look at those signs:

Read More

The Main Tech Ecosystems and Their Apps

Apps-2What happens if a user has a computer crash and all the apps are stored in his hard drive? The answer is the following: if you have a Google account, or an Apple Store Account, or even a Windows store account, once the computer has been cleaned from viruses or reformatted, you should be able to download your apps again after having logged into your account.

Nowadays it seem inappropriate to describe pc and smartphones as computers or pseudo-pcs: these devices are called ecosystems because they encompass a large number of apps that make them work as they are supposed to. As a matter of fact today the smartphone market is featured by the apps ecosystems: it is not the phone that makes the app, but the apps make the phone working well or performing poorly.

Read More

Are There Now More Tablets than PCs or Viceversa?

tablet-pcIn 2013 laptop and desktop sales have been steady and tablet sales are in exponential growth. It is too early, however, to confirm that pcs are dead and that laptops have capitulated. Some pc manufacturers are slightly changing their targets: Toshiba, for example, is redesigning their laptops and giving birth to thinner machines; Hp, on the other hand, is adding cool technology to its computers. Other companies like Acer are integrating laptops and desktops with touchscreens.

Read More

Is the Desktop PC Dead?

desktopUntil ten years ago, computers were a luxury. Today everybody has a pc in the form of a tablet, smartphone, laptop or desktop. But, why all these devices are called “PC”?Technically speaking, as along as a device has a processor, can go on the Internet and receive emails, that little monster is actually a PC. So, where is the catch? The deal is on how well or bad computer manufacturers have perceived the mobile life we all have and how much we need to integrate our technological actions with the devices we own.

Read More

Network Security As a Process

security-network

 

Network security is a process. It consists of a set of rules and procedures that aim at protecting the hardware and software assets of an individual as well as the data of a company. In network security there are many misconceptions and we want to make clear the following:

Read More