facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Remember the Equifax Breach? Here’s an Update

Remember the Equifax Breach? Here’s an Update

Spoiler alert: it isn’t good news.

On September 7th, 2017, it was made public that Equifax had suffered one of the largest cybersecurity breaches in history, and as a result, had left 145.5 million consumers in the United States vulnerable to identity theft. Due to a website application vulnerability, the personally identifiable information of these people was exposed from May until July of that year.

0 Comments
Continue reading

ISPs Altering Service Strategies for Coronavirus

ISPs Altering Service Strategies for Coronavirus

In light of the coronavirus outbreak that swiftly swept across the globe, there have been efforts made by many telecommunications companies to make life easier for their customers. These customers are likely holed up at home, working remotely if possible. One way or another, they are going to want Internet access, and in a show of solidarity, numerous ISPs and cell carriers are delivering.

0 Comments
Continue reading

Making the Most of MSP Memes

Making the Most of MSP Memes

Memes have become a frequent way that people - and businesses - communicate nowadays. Today, we’ll go into why Internet memes resonate so strongly with so many of us, and we’ll share some that we find particularly funny.

Tags:
0 Comments
Continue reading

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

0 Comments
Continue reading

Office Gadgets Your Co-Workers Will Love

Office Gadgets Your Co-Workers Will Love

Everyone likes cool technology gifts. Your family loves them and as the holiday’s approach, many offices hold Christmas parties and have gift swaps where co-workers are always looking to give and receive useful doodads. Let’s take a look at some of our favorite tech gadgets for 2019.

0 Comments
Continue reading

How to Shop Securely This Holiday Season

How to Shop Securely This Holiday Season

While the major holiday shopping days have passed us by, many people are still looking for that perfect gift often using the Internet to find it. While online shopping is certainly more convenient, it can also be dangerous. To help keep you safe this season and beyond, we’re reviewing a few practices to protect your identity while shopping online.

0 Comments
Continue reading

I Lost Data Once… A Collection of Horror Stories; Part 2

I Lost Data Once… A Collection of Horror Stories; Part 2

Here’s a horror story about an entrepreneur who, at a glance, was following many data backup best practices. Unfortunately, at the end of the day, things didn’t go so well when a crucial task was missed.

0 Comments
Continue reading

I Lost Data Once… A Collection of Horror Stories; Part 1

I Lost Data Once… A Collection of Horror Stories; Part 1

I wanted to share a few stories we’ve gathered about times when a person or business has lost data. First, thank you to everyone who shared these stories with us and allowed us to publish them on our blog, and… we’re glad you made it through. The first one is a story about someone who learned their lesson the hard way.

0 Comments
Continue reading

Is Big Tech Getting Too Big?

Is Big Tech Getting Too Big?

Some businesses have caught lightning in a bottle with the advent and overt use of the Internet. These companies now read like a who’s who of technology: Amazon, Google, Facebook, Apple, Microsoft. These companies are now some of the most lucrative in the world and there has been some very serious questions if they’re using their positions at the top of tech in unethical ways. Today, we’ll take a look at “Big Tech” and debate whether or not something has to be done to break up these companies before they become too powerful to fail. 

0 Comments
Continue reading

7 IT Myths We Hear Too Often

7 IT Myths We Hear Too Often

When you work in the IT space, you get to hear some funny things - technology myths, conspiracies, and other rumors that are shared around the water cooler. We’ve heard it all, and we wanted to share some of these myths so you don’t get tripped up by them.

0 Comments
Continue reading

Technology is a Key Ingredient for Food Delivery Services

Technology is a Key Ingredient for Food Delivery Services

Have you ever considered how much technology has made the world smaller? For example, think about how much easier technology has made it to access goods and services via the Internet. Entire industries have developed thanks to this technology. One notable example: app-based food delivery.

0 Comments
Continue reading

Simple and Smart Audio Recording Technology

PMR61_400_400

Transparency in government is a key component of any free society, and U.S. law encourages government agencies to make records available to the public whenever possible.

0 Comments
Continue reading

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

0 Comments
Continue reading

Enhancements Made to Google Maps

Enhancements Made to Google Maps

Google Maps is a neat service that helps users navigate during their travels, but more upgrades are being released all the time to augment their experiences. Some of the most recent updates have provided additional functionality that can provide users with even more ways to use Google Maps--particularly in regard to actually making it to their destination on time and in style.

0 Comments
Continue reading

How Machine Learning Can Help Our Health

How Machine Learning Can Help Our Health

Machine learning has become a big deal in a variety of industries, healthcare being a prime example. There are a variety of applications for machine learning in this incredibly important field, all of which show great potential in improving patient care. Below, we dive into just a few examples of how machine learning can improve healthcare.

0 Comments
Continue reading

A Brief History of Data Backup

A Brief History of Data Backup

While data backup is a necessary component to any modern business’ success, the idea itself certainly isn’t modern. The act of protecting information dates back to before dates were even an inkling, when humanity was still writing data on cave walls to preserve it and notching animal bones to aid in primitive mathematics. Let’s review the history of data preservation, and how we’ve gotten to our current point.

0 Comments
Continue reading

Solar Energy Can Be a Boon to Businesses

Solar Energy Can Be a Boon to Businesses

When running a business, keeping the lights on is expensive - and we literally mean keeping the lights on. Power is a costly thing, and with more and more business operations relying on electronic devices, there’s an increased expenditure for power. In order to keep your business up and running, you may consider going in a different direction for energy - perhaps up?

0 Comments
Continue reading

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

0 Comments
Continue reading

How Word Got Around in a Galaxy Far, Far Away

How Word Got Around in a Galaxy Far, Far Away

Science fiction is filled with incredible technology, especially in terms of how the characters communicate. This is especially true in the epic space opera Star Wars. Fortunately for viewers like you and me, some of the communication devices and technologies used a long time ago, in a galaxy far, far away, may not be so far off.

0 Comments
Continue reading

Don’t Let Bias Influence Your Business

Don’t Let Bias Influence Your Business

Have you ever heard of the term “bias?” It has a negative connotation to it, but it’s not necessarily a bad thing. A bias can predispose you to a skewed consideration or thought when met with what is known to be a seemingly neutral stimuli. In some cases, they can cause more harm than good, which is why it’s a good thing to take another look at how you approach certain situations. Researchers have discovered several trends about why we hold certain biases, as well as how we can overcome them.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Data Business Management Hackers Hardware Microsoft Network Security Workplace Tips Backup Hosted Solutions Managed Service Provider Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Computer Google User Tips Innovation Small Business IT Support VoIP IT Support Smartphones Data Backup Collaboration Quick Tips Mobile Devices Network Business Continuity communications Microsoft Office Gadgets Social Media Android Data Recovery Upgrade Disaster Recovery Cybersecurity Communication Mobile Office Server Smartphone Virtualization Mobile Device Management Miscellaneous Phishing Holiday Ransomware Vendor Management Outsourced IT Operating System Windows 10 Passwords Windows Tech Term Internet of Things Users Managed IT Services Unified Threat Management Remote Monitoring Apps Mobile Device Facebook Automation BDR BYOD Remote Computing Managed IT services Apple Mobile Computing Data Management Analytics Windows 10 WiFi History Artificial Intelligence Cloud Computing The Internet of Things Marketing Browser Save Money Firewall Training Help Desk Alert App Encryption Big data Two-factor Authentication Bandwidth Office Health IT Consultant Information Technology Spam Office 365 Business Technology Budget Bring Your Own Device Maintenance Antivirus Printer Gmail Government Managed IT Cybercrime Content Filtering Going Green Access Control Windows 7 Hard Drives Managed Service Wireless Technology Saving Time Computers VPN Virus Tech Support Search Recovery Information Employer-Employee Relationship Retail Lithium-ion Battery Healthcare Best Practice Cost Management Outlook Windows 8 Hiring/Firing Blockchain Computing Humor Data Loss Customer Service Travel Education Project Management Update iPhone Phone System Networking Hacking IBM Money It Management Augmented Reality Document Management Proactive IT Patch Management SaaS Computer Repair Running Cable Conferencing File Sharing Administration Law Enforcement Hard Drive Wireless Intranet Twitter Data Breach Compliance Mobility Storage Website Solid State Drive Data storage Avoiding Downtime Flexibility Risk Management Current Events Value Password Legal Save Time Hacker Downtime Customer Relationship Management Regulations Data Security Applications PowerPoint Disaster User Virtual Desktop End of Support Social Networking Hosted Solution Social Robot Scam Securty Voice over Internet Protocol Monitoring Google Maps DDoS Digital Social Engineering Websites Management Black Market Word Cryptocurrency Laptop Net Neutrality Meetings Vulnerabilities Business Growth Cooperation Software as a Service Business Intelligence Private Cloud Cortana Wi-Fi Excel Digital Payment Vendor Remote Work Telephony Router Covid-19 Machine Learning Fax Server Telephone Systems Comparison Tablet Paperless Office Sports Company Culture Mouse Professional Services Public Cloud Licensing Downloads Webcam Specifications Safety Text Messaging Statistics Integration Programming Identity Theft Redundancy IT service Smart Devices Network Congestion Documents Teamwork Heating/Cooling Entertainment Virtual Reality Managed Services Provider Evernote Politics Inbound Marketing Emails Virtual Assistant Bluetooth Streaming Media Automobile Multi-factor Authentication Chromebook Computing Infrastructure Hack Managed Services Telephone Employee/Employer Relationship Start Menu Tech Terms Mobile Technology Google Docs Pain Points Memory How To eWaste Managed IT Service Experience Chrome User Error Download Co-managed IT Monitors Uninterrupted Power Supply Cleaning Processor Office Tips Vulnerability Computer Accessories Microchip Taxes Bitcoin Processors Lifestyle Distributed Denial of Service USB YouTube Data Protection Trending Distribution Presentation Gaming Console Unified Communications Settings Drones Remote Workers HTML Best Practives Hacks Physical Security Application eCommerce Harddrive IT Fiber-Optic Database Human Resources Data Analysis Employees WannaCry Debate Mobile Security Banking Botnet GDPR Managing Risk Time Management Freedom of Information Skype Telephone System Relocation Tablets SQL Server GPS Corporate Profile Virtual Private Network Archive Tech Hypervisor External Harddrive Assessment SharePoint Multi-Factor Security Cost Permissions Language Development Software License Trends Microserver Sync Google Calendar Devices Notifications CCTV Digital Signature Holidays Tip of the week Point of Contact Fraud Tactics Fileless Malware Hybrid Cloud UTM Content Get More Done Business Metrics Computer Malfunction Modem Strategy Thin CLient Touchscreen News switches Writing Reliable Computing Proxy Server Azure 3D VoIP Ebay Music Procurement In Internet of Things Term Smart Phones Consultation Upgrades Legislation Error Printer Server Electronic Medical Records Transportation Knowledge Video Conferencing IT Plan Enterprise Resource Planning Turn Key Technology Tips Recycling Accountants A.I. Trojan Recording Optimization LiFi Communitications Analytic email scam Addiction PDF Directions Display Supply Chain Management Motion Sickness Best Available Keyboard SSID How To Leadership Fake News Product Reviews Organize Scalability Dark Web Free Resource Adminstration Pirating Information Audit Processing Data Warehousing Deep Learning Wireless Headphones Messenger Tracking Domains Health IT Work/Life Balance Internet Service Provider Read Migration Connected Devices Wasting Time Access Equifax Fleet Tracking Rental Service Public Speaking Logistics Virtual Machines Emergency Hard Drive Disposal Visible Light Communication IT Assessment Network Management Remote Working Device Management Device security MSP Web Server Shortcut Cyber security Microsoft Excel IT consulting Cabling Bookmark Computer Care Administrator Entrepreneur Google Play Telephone Service Google Drive Windows Server 2008 Business Managemenet Nanotechnology Social Network Webinar Books Workers Troubleshooting Employer/Employee Relationships Content Management Desktop Finance Managing Costs Spyware Mobile Payment CIO Startup Asset Tracking Supercomputer HIPAA Microsoft 365 Upselling Advertising Flash Electronic Health Records Business Cards Service Level Agreement Environment Staffing Google Wallet online Currency Username Competition Medical IT Trend Micro Windows XP Memes Unified Threat Management Backup and Disaster Recovery Worker Electronic Payment Browsers Electricity Video Surveillance Printing Gamification Security Cameras Threats Saving ZTime Displays Screen Reader Customer Resource management Reading Samsung Business Owner User Tip Proactive Maintenance Society Managing IT Services Navigation Virtual Machine cache Television Micrsooft LinkedIn Smart Tech Employer Employee Relationship IP Address Solutions Surveillance Piracy Upload G Suite Managing Stress Printers Regulation CrashOverride Capital 3D Printing Personal Information Productuvuty Financial

toner1