Manhattan Tech Support Launches its Brand New Website


Welcome to our new home on the web! The Manhattan Tech Support team has put a lot of time and thought into improving our online presence, and we are thrilled to go live with our new website. We sincerely hope it reflects our passion for helping NYC businesses flourish through technology.

Why the new website? There are a few reasons.

First, it’s more organized, and it better reflects our value today as a full-service technology partner. Our reach goes well beyond that of just the typical MSP. We have experts on staff that can help you leverage technology to streamline processes, achieve regulatory compliance, make better decisions through business intelligence reporting and analytics, and much more.

Second, it’s more useful to our partners and friends in the NYC business community. Our site will constantly be evolving with new, useful technology-related information – written by our team of experts – including blog articles, white papers, and other technology news to keep our subscribers knowledgeable of the latest happenings in this space. The new website provides this content in a much more attractive, interactive resource that people will look forward to visiting regularly.

Last, we wanted a website that better reflects our experience providing world-class IT services to businesses in New York City. In a market saturated with companies in just about every professional services field, there are those whose attention to detail and understanding of the ever-changing landscape helps them to shine brighter than the others. We feel this new website certainly hits the mark.

Our website may have changed, but our dedication to excellence in technology services remains the same. Businesses that have relied on our technical skills can expect the same outstanding, flat-rate technology service they’ve always been receiving.

That’s because…

We’re Passionate About Being a Truly World-Class IT Partner

Manhattan Tech Support has developed a reputation for outstanding managed IT services and help desk support. Today, we’re considered one of the elite technology partners in NYC – having been featured consistently in CRN’s MSP 500 list in

New e-book links poor network access security to data breach risk

Ruckus has just published a new e-book titled “Seven Network Access Security Risks—and How They Can Lead to a Data Breach.” It focuses on faulty network access security as a risk area that can lead to data compromise. As the title implies, this e-book outlines seven distinct risk areas that IT organizations should be aware of, especially when it comes to providing connectivity for BYOD and guest users.

As detailed in a previous Ruckus blog, “What’s wrong with PSKs and MAC authentication for BYOD?”, default methods of network onboarding and authentication have serious security flaws that can leave you open to data compromise. These security holes get less attention that more high-profile threats like ransomware, but the dangers are still very real. Sometimes it’s the attack surface that you aren’t thinking about that attackers seek to exploit.   

Linking IT security risk
areas to the potential for a data breach

Sometimes the link between a threat vector and the risk of data
compromise is obvious. Keylogging malware tracks a user’s every keystroke,
including when they type in their username and password for cloud-based
business applications. Email phishing attacks compromise credit card numbers or
other sensitive data by tricking users into entering them into a website that
spoofs a legitimate site. Misconfigured cloud storage can leave sensitive data
just hanging out there on the web for attackers to steal. All of those are
obvious ways that attackers can get at your data.

Network access security is a category where the linkages may
be less obvious. The point of the new e-book is to help clarify the connection
between this risk area and a potential breach. It’s a highly accessible way to
increase your knowledge of this often-overlooked area of the IT security domain—a
five-minute read covering an underestimated attack surface in modern IT
environments. This document can help you keep other stakeholders in your
organization informed about the risks as well, so feel free to pass it along. We
should emphasize that no registration is required to …

Pose Detection comparison : WrnchAI vs OpenPose

In our previous posts, we discussed how to perform Body and Hand pose estimation using the OpenPose library. Recently, we got a chance to try the state-of-the-art pose-estimation system ( WrnchAI ) built by Wrnch and thought of comparing it with OpenPose. We evaluated the Human Body Pose Estimation systems and report our findings by […]

from Learn OpenCV…

A New Age for Public Safety Video Surveillance

surveillance is one of the most powerful tools law enforcement has in its
arsenal. It’s used to protect citizens and investigators, collect evidence, and
prevent crime. Unfortunately, law enforcement officials don’t always have the
lead time they need to set up equipment. While wireless IP video cameras help
facilitate rapid deployment, there’s still the legacy network infrastructure to
contend with. For that, law enforcement agencies need “pop-up” security enabled
by a solution that is cost-effective and easily deployed, virtually anywhere.

Video Survellance

development of IP-based video cameras gave law enforcement officials more
flexibility in terms of camera placement, but the network infrastructure
remained a barrier to achieving cost effective, rapid deployment. Wireless
connectivity over cellular networks like 4G LTE is simply too expensive. Plus,
it’s not unusual for service providers to throttle bandwidth, resulting in
performance issues. Other wireless solutions use a low bit rate at short range,
recording one frame every five seconds. While this may be suitable for
situational awareness, it doesn’t meet requirements for investigative cases
requiring real-time data.

is of the essence during a criminal investigation. To benefit from video
surveillance in these scenarios, law enforcement agencies must be able to
quickly deploy video surveillance when and where it’s needed—without filing for
permits, installing fiber infrastructure, or incurring exorbitant fees. This
can be achieved with Ruckus Video Mesh Distribution.

Ruckus Video Mesh Distribution is an easily deployable surveillance network that delivers high bandwidth and full frame rate with low latency. Ruckus SmartMesh provides backhaul over a WiFi network, enabling law enforcement agencies to achieve visibility virtually anywhere there’s power—including locations where running copper or Fiber cable is unfeasible. The self-forming, self-healing, and self-optimizing technology makes mesh networking easy to deploy and manage.

Video Mesh Distribution…

  • Lowers installation and operating costs by reducing the need for Ethernet cabling and RF planning.
  • Delivers consistent bandwidth. Traffic is never throttled as it is with cellular providers.
  • Automates configuration, enabling Smart Mesh Networking WLANs to be deployed and operational in half the time of conventional WLANs.
  • Works

The World Of Data

Whether big or small, data is undoubtedly a big part of our lives. And in this highly technologically-savvy world, data has become digital and proliferates the world both online and offline. With the growing number of data being shared on a daily basis, the issue on storage is a problem we always face especially if the storage capacity of your device can’t keep up with your data use. Gone were the days when devices have so little storage capacity, storage is much bigger now and you can always buy a secondary storage device if your device does not have enough storage space.

The use of flash drives and external hard drives have become the norm now. People usually purchase them for additional storage, so they can clear their device and add more files that will eventually be transferred to a secondary storage much later. Most tech users are always on the lookout for the best secondary storage at a reasonable price because it can free them of their constant worries of running out of storage space. Most external hard drives (EHDs) have bigger storage space now and they are generally reasonably priced too. They are fairly easy to use, so you won’t have any difficulty transferring your files from one device to the other.

The Seagate 8TB USB 3.0 desktop external hard drive is down to $129.99 on Amazon. This hard drive has been selling for around $150 since a drop in late September. Before that, it regularly sold for as much as $180. Today’s deal is the best price we’ve ever seen.

Seagate’s drive is meant to be as easy to use as possible. It has plug-and-play compatibility, so you can just immediately start using it, as well as drag-and-drop utility so it’s easy to get your data where you want it. It transfers at USB 3.0 speeds and is backwards compatible with USB 2.0. You’ll need to reformat it to get it to work with Mac. Users give it 4.6 stars based on 99 reviews.


The Time to Stop Relying on Spreadsheets Has Arrived


Microsoft Excel is used for a wide variety of tasks, from visualizing business data, to tracking work expenses and managing books. But in the age of cloud-empowered productivity and pervasive mobile devices, is the humble spreadsheet keeping pace? While many accountants still seem to enjoy using them, there’s a huge number of tasks that spreadsheets are ill-suited for, like business reporting and project management. Let’s take a closer look at how spreadsheets may be hurting your business, and why custom software that’s powered by a robust database is usually the better solution.

Spreadsheets are Highly Error-Prone

Have you heard of “dueling spreadsheets”? It’s a term that describes when two different versions of the same spreadsheet contain conflicting data. This is an unfortunately common scenario that can arise in a few different ways.

The most common is when spreadsheets aren’t being stored in a centralized location. If one employee downloads a spreadsheet that contains today’s data, but the next day another employee downloads a copy with tomorrow’s data, then a conflict between these two datasets is likely. The problem of dueling spreadsheets is also common when people add or delete information to a single spreadsheet then share it with others via email or cloud file-sharing systems. Which version is which? It’s hard to know.

Because spreadsheets were not built with the security or integrity of data in mind, and offer no reliable way to audit changes, the problem of errors is extremely common. According to MarketWatch, as many as 88% of spreadsheets contain an error, a problem that’s grown so severe; it’s even led to the formation of an organization specifically to address the issue of spreadsheet mistakes.

Spreadsheets Waste Time

According to a report by research and advisory firm Ventata, 44% of businesses struggle with managing their spreadsheets. Their research found that the average employee spends 12 hours a month looking for and correcting errors in spreadsheets. You can read more about that in their blog post here.

In some situations, that 12 hours a month might even …

E-rate apocalypse?! Not so fast.

If you work for, or with schools and libraries you have most
certainly heard or asked the following questions over the past year:

“What will happen to E-rate next year?” or, “Will E-rate go back to the two-in-five-year rule?”

…and then of course there’s the gravest of questions, “Is E-rate going away?”


Perhaps the easiest of these questions to answer is whether E-rate is “going away.”  Simply put, no. E-rate is a U.S. Federal subsidy program available to schools and libraries in support of deploying and maintaining affordable Broadband Internet access for instructional purposes.  Funding for this program continues to be collected today, as it has since its inception in 1996 via the Universal Service Fee on every U.S. phone bill. Despite changes to the oversight of this fund from the Universal Service Administrative Company (USAC) to the U.S. Treasury, assurances remain that this funding will not be reappropriated. Short of an act of Congress, the money is there.

In the absence of clear and concise guidance from the FCC
& USAC (nothing about E-rate is clear and concise) on potential changes to
the program, we can certainly read the proverbial tea leaves and arrive at some
relatively confident assumptions until more information is released. I base my
conclusions on what we know about the E-rate program historically, a recent
report published by the FCC and recent conversations with FCC & USAC

Let’s try and understand a little more about the current E-rate
program and what is at stake. In December of 2014, the same month I started at
Ruckus, the FCC issued its “Second
E-rate Modernization Order
.” This order detailed the commission’s
intent to improve performance and achieve the program’s goals of increasing
broadband access (Internet) in schools and libraries, particularly where such
access is limited. The initiative is subsidized based on level of need (Free
& Reduced Lunch) and student population (~$150 per student).  This is a relatively crude summary, although
it should provide a 100,000 foot “blog” view. 

One of the biggest changes was …

The Evolution of Wi-Fi 6: Part 4

<div class="language-selector"<p class="icon"<img src="" width="28px" /</p<ul class="lang-list"<li<a href=""Read in Spanish</a</li<li<a href=""Read in Portuguese</a</li</ul</div

In part three of this series, we took an in-depth look at OFDMA, MU-MIMO and BSS Coloring. In this blog post, we’ll explore target wake time (TWT), 1024-QAM and Long OFDM Signal.

Wi-Fi 6

Target Wake Time (TWT) and Wi-Fi 6

Target wake time (TWT) is another mechanism introduced in the Wi-Fi 6 (802.11x) standard. Essentially, TWT allows devices to deterministically negotiate when and how often they wake up to send or receive data. TWT increases device sleep time and in turn, substantially improves battery life, a feature that is especially important for IoT devices. In addition to saving power on the client device side, TWT enables wireless access points (APs) and devices to negotiate and find specific times to access the medium. This helps optimize spectral efficiency by reducing contention and overlap between users.

1024-QAM & the Need for Speed

Although bolstering spectral efficiency is one of the defining features of Wi-Fi 6 (802.11ax), an additional speed boost facilitated by 1024-QAM is obviously a nice bonus. Quadrature amplitude modulation, or QAM, uses both phase and amplitude of an RF signal to represent data bits. As we mentioned above, Wi-Fi 6 (802.11ax) introduces 1024-QAM, along with new modulation and coding schemes (MCS). These define higher data rates that bolster throughput and enable 25% higher capacity with 10 bits per symbol versus 8 bits in 256-QAM, the latter of which is supported by Wi-Fi 5 (802.11ac). Put simply, more bits equal more data, making the (payload) delivery of data more efficient.

Wi-Fi 6 (802.11ax) also introduces two new modulation coding schemes: MCS 10 and MCS 11. Both will likely be optional. It should be noted that 1024-QAM can only be used with 242 subcarrier resource units (RUs) or larger. This means that at least a full 20 MHz channel will be required for 1024-QAM.

Long OFDM Signal & Outdoor APs

When …

5G is great, but for the enterprise?

As we gird our loins for the annual pilgrimage to Mobile World Congress, I have a pretty good idea what to expect when we get there: Sweeping statements and predictions about how 5G is NOW and it’s is going to change everyone’s world forever!

To which I say, “easy, cowboy!”


Now, don’t get me wrong: 5G New Radio (NR) promises to be transformational in many ways and we at Ruckus expect to be part of that transformation. But, as we see it, 5G NR technology will be only one part of a much more colorful tapestry, especially in the enterprise. We now find ourselves at the beginning of an age in which a plethora of ultra-capable wireless protocols will coexist and complement one another. Wireless Avengers, if you will.

This is what the ‘5G era’ is all about.

Nowhere is this new ear more in evidence than in the enterprise, where the WLAN and Wi-Fi are synonymous. These technologies have been optimized for the enterprise (and service providers!) for 15+ years by vendors like Ruckus. And, with the latest Wi-Fi 6 iteration (see: Ruckus R730), Wi-Fi is shockingly capable, with Gbps data rates, millisecond latency and even some DNA spliced from its LTE cousin. But make no mistake: The all-wireless office is being built today, with Wi-Fi. And it will be built tomorrow, with Wi-Fi.

if you walk down the hallway (or cross the courtyard) to Operations, what we’ve
found is that organizations of every stripe are seeking to reduce OpEx by, for
example, increasing their energy efficiency. They’re deploying networks based
on low-power protocols like Zigbee and BLE for condition monitoring: Lighting,
temperature, moisture, occupancy detection. And for safety: Connected entry,
panic buttons, and fall detection. Subliminal message alert: What if they
didn’t need to deploy stand-alone networks?

there is another realm: The realm of the Critical. Use cases that are begging
for the right wireless enabler to let them flourish. Think reliable staff
communications. Think automated guided vehicles. Think nomadic transaction
kiosks. Think IP …

5 Issues that impact Wi-Fi performance in dense environments

Worldwide data and video traffic are growing at double-digit rates. This increase is driven by connected devices and applications like 4K video streaming, VR/AR and eSports. Adding to the complexity of this environment impacting Wi-Fi performance are diversifying device categories and apps, such as headless IoT devices, video and voice-over-Wi-Fi.

Moreover, the congestion of people, devices and bandwidth-hungry apps makes for numerous real-world challenges that conventional wireless technology has difficulty overcoming, especially in dense environments. Let’s take a closer look at some of these challenges below.

Wi-Fi performance

Overloaded network

Wi-Fi antennas often radiate signals – like a lightbulb radiates light – in all directions. This can create misdirected and wasted radio energy.

The solution? Ruckus BeamFlex+ technology, which enables the antenna system within a Ruckus access point (AP) to dynamically sense and optimize for its environment. The antenna system also significantly bolsters range and Wi-Fi performance by mitigating radio interference, as well as noise and wireless performance issues.

Too many devices

All access points use ‘lanes’ (radio channels) to transmit and receive traffic. However, a specific lane can become congested, leaving an AP unable to determine if other lanes are free to accommodate wireless traffic.

The solution? Ruckus ChannelFly dynamic channel management, which helps our APs boost Wi-Fi performance by dynamically (automatically) switching a client from a crowded channel to a less congested one.  

Wasted radio energy

Excessive management traffic typically saturates available Wi-Fi spectrum in dense Wi-Fi environments. This results in reduced connectivity and low per-client throughput.

The solution? Ruckus Airtime Decongestion, which enables APs to more selectively respond to clients. This dramatically increases overall network efficiency for higher airtime utilization and delivers a more optimized user experience.

Channel congestion

APs are frequently overloaded with an uneven client load in dense network environments. This inefficient utilization of network capacity results in a sub-optimal client-to-AP link quality and lower throughput for clients.

The solution? Ruckus Network Capacity Utilization, which employs real-time learning techniques to associate clients with APs that offer higher link quality and capacity. This mechanism facilitates higher overall network capacity and …