facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services Efficiency Google IT Support Small Business User Tips Computer Mobile Devices Smartphones Innovation Quick Tips Business Continuity Gadgets VoIP Microsoft Office Disaster Recovery Network Android Data Backup Social Media Productivity Collaboration Communication Mobile Office Virtualization Smartphone Server Mobile Device Management Data Recovery communications Upgrade Miscellaneous Ransomware Windows 10 Tech Term Cybersecurity IT Support Unified Threat Management Windows Phishing Remote Monitoring Vendor Management Passwords Facebook Operating System Holiday Mobile Computing Managed IT services Analytics Apps Automation BYOD Remote Computing Users WiFi BDR Apple The Internet of Things Mobile Device Data Management Outsourced IT Marketing Internet of Things Firewall History Artificial Intelligence App Managed IT Services Browser Save Money Alert Cloud Computing Big data Encryption IT Consultant Maintenance Printer Content Filtering Going Green Health Spam Office 365 Bring Your Own Device Antivirus Windows 10 Two-factor Authentication Office Gmail Bandwidth Managed IT Virus Cybercrime Tech Support Lithium-ion Battery Best Practice Information Technology Cost Management Hiring/Firing Business Technology Hard Drives Help Desk Training Wireless Technology Budget Saving Time Outlook Windows 8 Search Update Recovery Employer-Employee Relationship Healthcare Access Control IBM Money It Management Hacking Document Management Phone System Blockchain Computers VPN Travel Education Government Compliance Mobility Humor Website Risk Management Data storage iPhone Save Time Applications Legal Networking Augmented Reality Managed Service PowerPoint Regulations Running Cable Proactive IT Administration SaaS Twitter Intranet File Sharing Customer Service Hard Drive Law Enforcement Information Solid State Drive Social Engineering Vulnerabilities Black Market Flexibility Cryptocurrency Business Intelligence Word Retail Digital Payment Laptop Excel Password Cortana Business Growth Router Downtime Value Customer Relationship Management Data Security Comparison Tablet Telephony Hacker Machine Learning Company Culture Patch Management Current Events Paperless Office Computer Repair Telephone Systems Data Loss Social Networking Sports Scam Disaster User Computing Hosted Solution End of Support Data Breach Social Robot Fax Server Digital Wireless Securty Project Management Google Maps DDoS Avoiding Downtime Websites Management Virtual Reality Politics Start Menu Tech Terms Storage Automobile Mobile Technology Emails Bluetooth Pain Points Cooperation Chromebook Software as a Service Net Neutrality Computing Infrastructure Hack Chrome Vendor Uninterrupted Power Supply How To eWaste Google Docs Vulnerability Private Cloud Experience Download Bitcoin Cleaning Windows 7 Monitors Computer Accessories Data Protection Distribution Office Tips Processors Gaming Console Microchip Taxes Trending Distributed Denial of Service USB Co-managed IT Conferencing YouTube Mouse User Error Unified Communications Settings Text Messaging Presentation Webcam Public Cloud Programming Voice over Internet Protocol Redundancy Statistics Specifications Safety Network Congestion Virtual Desktop Monitoring Identity Theft Evernote Lifestyle Documents Virtual Assistant IT service Entertainment Streaming Media Heating/Cooling Inbound Marketing Migration Connected Devices Product Reviews Processing In Internet of Things Data Warehousing Adminstration Pirating Information Wireless Headphones Telephone Upgrades Health IT Leadership Managed IT Service Access PDF Equifax Fleet Tracking Read Logistics Emergency Hard Drive Disposal Microserver Network Management LiFi Scalability Computer Care Device security MSP Motion Sickness Best Available Microsoft Excel Keyboard Bookmark Desktop Finance Work/Life Balance Google Play Google Drive Windows Server 2008 Nanotechnology Social Network Deep Learning Device Management Messenger Tracking Get More Done Domains Memory Business Managemenet Processor Spyware Mobile Payment Printer Server Startup Asset Tracking Content Management Microsoft 365 Rental Service Meetings Turn Key Public Speaking Business Cards Service Level Agreement Visible Light Communication Browsers Cabling Electricity Printing Trojan Upselling Username Medical IT Web Server Shortcut Unified Threat Management Backup and Disaster Recovery IT consulting Gamification Security Cameras Wi-Fi Administrator Organize Entrepreneur Video Surveillance Screen Reader Customer Resource management online Currency User Tip Books Workers Troubleshooting Advertising Flash Navigation cache Television Environment Smart Tech CIO Solutions Supercomputer HIPAA Saving ZTime Piracy Upload Data Analysis Worker WannaCry Downloads Electronic Payment HTML Staffing Google Wallet Professional Services Competition Fiber-Optic Database Windows XP LinkedIn Harddrive Mobile Security Society GDPR Time Management Freedom of Information Debate Telephone System Displays Reading Samsung Corporate Profile Business Owner Software License Trends Skype Tech G Suite Assessment SharePoint Webinar GPS Multi-Factor Security Cost Micrsooft Archive Integration Employer Employee Relationship IP Address Fileless Malware Licensing Google Calendar Human Resources Devices Drones Hacks Physical Security Tip of the week Application External Harddrive Fraud Tactics UTM Content Point of Contact Modem Banking Botnet Touchscreen News Proxy Server Relocation Tablets VoIP IT Plan Enterprise Resource Planning Permissions Language Term Sync Consultation 3D Ebay Legislation Error Electronic Medical Records Knowledge Thin CLient Directions Technology Tips Accountants A.I. Recording Notifications CCTV Digital Signature Smart Phones email scam Addiction Audit Best Practives Multi-factor Authentication Music Analytic SSID Business Metrics Computer Malfunction Teamwork Fake News switches Writing Recycling Dark Web Reliable Computing Productuvuty 3D Printing Managing Stress Printers CrashOverride Regulation Transportation Capital