facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These 3 Popular Office Technologies are Officially Obsolete [VIDEO]

b2ap3_thumbnail_obsolete_tech_400.jpgToday’s modern office is full of technology. Although, just because a workplace has wall-to-wall technology, doesn’t make it modern. It’s possible for an office to be outfitted with outdated technology. There’s a good word that describes a setup like this: Obsolete. Is your office using obsolete technology? To find out, let’s look at a few pieces from the Museum of Obsolete Objects.

Continue reading

Will the Computer Mouse Go Extinct?

b2ap3_thumbnail_olmouse400.jpgHow could it have ever come to this? The everyday practical use of the beloved computer mouse has been put in jeopardy due to the relatively recent introduction of touchscreen technology. Tablets, smartphones, and touchscreen computers are driving our handheld friends off of the shelves and into history books. Will the computer mouse go extinct in the near future?

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Quick Tips Smartphones User Tips Mobile Devices Innovation Gadgets Business Continuity Microsoft Office Disaster Recovery VoIP Android Network Social Media Productivity Data Backup Mobile Office Virtualization Collaboration Server Smartphone Mobile Device Management Communication Data Recovery Miscellaneous Ransomware Windows 10 Tech Term Upgrade communications Unified Threat Management IT Support Windows Holiday Passwords Operating System Remote Monitoring Facebook Vendor Management Apps BYOD Managed IT services Remote Computing Mobile Computing Cybersecurity Phishing BDR Users Automation WiFi Analytics Marketing Apple Data Management The Internet of Things Mobile Device Outsourced IT History Firewall Internet of Things Browser Alert Save Money Artificial Intelligence App Managed IT Services IT Consultant Encryption Big data Bring Your Own Device Bandwidth Office Antivirus Content Filtering Spam Maintenance Office 365 Printer Going Green Cloud Computing Gmail Health Windows 10 Saving Time Help Desk Wireless Technology Cybercrime Managed IT Search Training Outlook Windows 8 Cost Management Business Technology Lithium-ion Battery Best Practice Information Technology Budget Hiring/Firing Virus Tech Support Hard Drives Two-factor Authentication Computers VPN Phone System Recovery Travel Employer-Employee Relationship Update Healthcare Access Control Hacking Blockchain Money Document Management IBM PowerPoint Government Website Intranet Law Enforcement Twitter Information Education Administration Compliance Data storage Risk Management File Sharing iPhone Save Time Hard Drive Applications It Management Humor Legal Networking Managed Service Mobility Regulations Proactive IT Customer Service Running Cable Augmented Reality SaaS DDoS Hosted Solution End of Support Project Management Robot Digital Websites Management Securty Current Events Machine Learning Solid State Drive Word Telephone Systems Retail Password Cortana Black Market Value Flexibility Fax Server Cryptocurrency Avoiding Downtime Laptop Hacker Business Intelligence Business Growth Data Security Digital Payment Router Downtime Google Maps Patch Management Excel Data Loss User Comparison Tablet Social Engineering Company Culture Paperless Office Scam Customer Relationship Management Social Sports Computer Repair Wireless Disaster Data Breach Social Networking Computing Entertainment Programming Private Cloud Gaming Console Heating/Cooling Statistics Download Evernote Storage Network Congestion Webcam Text Messaging Telephony IT service User Error Start Menu Tech Terms Co-managed IT Microchip Taxes Vulnerabilities Distributed Denial of Service Mobile Technology Streaming Media Bluetooth Software as a Service eWaste Public Cloud Uninterrupted Power Supply Lifestyle Vulnerability Net Neutrality Inbound Marketing Bitcoin Chrome Identity Theft Google Docs Processors Experience Data Protection Cleaning Pain Points USB Monitors Computer Accessories Virtual Reality Office Tips Presentation Politics Conferencing Automobile Emails Safety Virtual Desktop Trending Chromebook YouTube Specifications Unified Communications Settings Redundancy Mouse Computing Infrastructure Hack Cooperation Documents Vendor Monitoring How To Legislation Error Cabling Knowledge Teamwork Processor IT Plan Enterprise Resource Planning Organize Web Server Consultation Books Workers Permissions Language Virtual Assistant Harddrive Browsers email scam Addiction Wi-Fi Administrator Technology Tips Debate Point of Contact Medical IT Accountants A.I. Fake News PDF User Tip Audit GPS Security Cameras Multi-factor Authentication Supercomputer Wireless Headphones Telephone Worker Music Best Available Keyboard Navigation Migration Connected Devices switches Writing Data Warehousing External Harddrive Fleet Tracking Reading Samsung Emergency Hard Drive Disposal Recycling Data Analysis Network Management Webinar Upgrades Access Domains Professional Services Analytic Equifax LiFi Microsoft Excel Thin CLient G Suite Computer Care 3D Ebay Public Speaking GDPR Product Reviews Device security MSP Employer Employee Relationship Read Nanotechnology Social Network Licensing Shortcut Tech Desktop Finance Hacks Physical Security Google Drive Windows Server 2008 Smart Phones Startup Asset Tracking Relocation Tablets Work/Life Balance Entrepreneur Fileless Malware Business Cards Service Level Agreement Banking Botnet Deep Learning Spyware Mobile Payment Troubleshooting Voice over Internet Protocol Visible Light Communication Memory Leadership Environment Device Management Proxy Server Unified Threat Management Backup and Disaster Recovery Sync Electricity Printing Adminstration Pirating Information HIPAA Modem Username Windows 7 Electronic Payment Electronic Medical Records Content Management Screen Reader Customer Resource management Best Practives Competition Term Business Managemenet Gamification Notifications CCTV IT consulting Recording Smart Tech Distribution Reliable Computing Directions Piracy Upload Business Metrics Computer Malfunction cache Television Business Owner Advertising Flash Dark Web online Currency Fiber-Optic Database In Internet of Things CIO WannaCry Downloads IP Address SSID HTML Microserver Time Management Freedom of Information Health IT Human Resources Telephone System Staffing Google Wallet Corporate Profile Application Processing Mobile Security Windows XP Multi-Factor Security Cost Get More Done Scalability Society Upselling Managed IT Service LinkedIn Software License Trends Motion Sickness Displays Assessment SharePoint Tracking Tip of the week Bookmark Fraud Tactics Printer Server Micrsooft Google Calendar Video Surveillance Devices Turn Key Messenger Touchscreen News Saving ZTime Archive Trojan Drones VoIP Digital Signature Google Play Skype UTM Content Rental Service Meetings Capital Printers Productuvuty 3D Printing Managing Stress CrashOverride Regulation