facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Digital Twin

Technology Basics: Digital Twin

Simulations are a common thing in many science fiction movies. Perhaps it’s an image on a screen that dictates what could happen as the result of a particular action. Maybe it’s a simulation of a certain event. Either way, the fact remains that something like this--previously relegated only to the realm of sci-fi--has now been brought to the technology industry in the form of a digital twin.

Continue reading

Students Shocked to Learn Their Online Teaching Assistant is Actually AI

Students Shocked to Learn Their Online Teaching Assistant is Actually AI

More students today are earning online degrees than ever before. Thanks to online learning management systems, the classroom experience can marginally be replicated in an online environment. One of the biggest problems associated with online teaching, however, is that students have trouble getting the attention they deserve. Enter: Artificially intelligent teaching assistants.

Continue reading

We Just Want These 4 IT Pain Points to Be Resolved Already

b2ap3_thumbnail_frustration_by_technology_400.jpgThe term “IT headaches” is an oxymoron, due to the fact that technology is supposed to make life easier, not harder. Yet, headaches and feelings of frustration often accompany working with technology--with the most frustrating headaches often stemming from issues that should no longer exist in 2016. Case in point, these four issues that cause us major “IT headaches.”

Passwords Still Being the Norm
Managing dozens of passwords can be a daunting task, especially if you follow best practices by making a different password for each account, and make sure that every password is complex and hard to remember. One solution is to use a password management tool like LastPass. While this a great way to simplify managing all of your passwords, the fact remains passwords are susceptible to theft. Plus, let’s not forget how annoying it is to navigate to a login page every time you need to access your account.

What makes passwords so frustrating to work with is that, thanks to the range of alternative security tools available on today’s market, passwords should be obsolete. Multi-factor authentication technology and biometric tools like retina and fingerprint scanning are easily available and make for a more secure option, as well as being more convenient to use. Knowing this actually makes it more frustrating when encountering password issues.

Aggressive Promotional Tactics From Technology Vendors
Let’s not beat around the bush here, this is first and foremost a criticism of you, Java and Flash. “Free” apps like this are often times only free because they get paid by sponsors to sneak in extra gimmicks, like annoying browser toolbars (with Yahoo and Ask being two of the worst) or a trial of antivirus software--both of which are difficult to remove once they’re installed on your PC. In most cases, you can opt-out of these “bonuses” during installation, but if you’re in a hurry, it’s easy to overlook this and leave the box check-marked.

This reminds us of another failed promotional tactic by Microsoft: getting users to “make Internet Explorer your default browser” with the aid of a prompt appearing every time you open IE--an approach that’s widely mocked by longtime Microsoft users. Unfortunately, such heavy-handed promotional tactics seem to be the trend for technology vendors, not the exception, which only adds to the frustration of working with technology.

Outdated Technology Still Being Used
It’s 2016 and paperless technology is easy to come by while being super affordable, yet, “modern” offices the world over are still littered with printers and fax machines. Now, as you’ve likely experienced, working with such equipment that’s prone to paper jams bring about a completely new level of IT frustrations--frustrations which can be avoided altogether by instead going with paperless solutions like PDFs, digital signatures, digital scanners, and cloud computing. Typically, businesses that go the route of using outdated and inefficient equipment, do so in an attempt to save money. However, in the end, this strategy actually ends up backfiring when time and productivity are lost.

Websites that Don’t Do What They’re Supposed To
Today’s computing age is heavily dependent upon the Internet, websites, and browsers. Yet, few standards exist for website design and browser functionality, which makes surfing the web an error-filled and maddening experience. Scott Matteson of TechRepublic vents:

Constant updates. Plugin woes. Websites that require you to log in to proceed to view an article but then take you to the home page when you comply. Browsers that don't save credentials no matter how many times you tell them to. Cumbersome site registration with illegible captchas and the requirement to wait for an email to complete setting up your account. (This is getting a better with the opportunity to log in with social media accounts, I'll admit.) The necessity to log your account ID and password somewhere or else use the same one you use everywhere—which is a BIG no-no. The list goes on.

We couldn’t agree more.

At Computerware, we experience our fair share of technology frustrations, and by far, the worst frustrations are akin to the ones listed above because they’re so easily avoidable. We’re sure that you’ve experienced these same frustrations on some level, and we’re here to tell you that IT doesn’t have to be this way! Reach out to us today and tell us about your worst technology grievances. You’ll be happy to learn that we’ll have a technological solution for you to remedy any and all of your IT woes.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices Quick Tips Smartphones User Tips Innovation Gadgets Business Continuity Microsoft Office Disaster Recovery VoIP Social Media Network Android Data Backup Mobile Office Virtualization Productivity Collaboration Server Communication Smartphone Mobile Device Management Miscellaneous Data Recovery Windows 10 communications Upgrade Tech Term Ransomware Windows IT Support Unified Threat Management Remote Monitoring Passwords Operating System Facebook Holiday Mobile Computing Cybersecurity Vendor Management Phishing Apps Managed IT services BYOD Remote Computing WiFi BDR Automation Users Mobile Device Data Management The Internet of Things Analytics Marketing Apple Outsourced IT Firewall History Internet of Things Managed IT Services Alert App Artificial Intelligence Browser Save Money Big data IT Consultant Encryption Going Green Health Spam Bandwidth Office 365 Bring Your Own Device Antivirus Cloud Computing Gmail Office Maintenance Printer Content Filtering Lithium-ion Battery Best Practice Information Technology Training Cost Management Windows 10 Hiring/Firing Help Desk Hard Drives Wireless Technology Managed IT Budget Windows 8 Saving Time Two-factor Authentication Outlook Search Cybercrime Tech Support Business Technology Virus Blockchain IBM Hacking Phone System Money Document Management Computers VPN Healthcare Access Control Travel Recovery Employer-Employee Relationship Update Managed Service SaaS Save Time File Sharing Augmented Reality Hard Drive Law Enforcement PowerPoint Proactive IT Mobility Running Cable Information Compliance Administration Data storage Customer Service Twitter Intranet Government Website Education Humor Legal Networking Applications It Management iPhone Regulations Risk Management Patch Management Paperless Office Telephone Systems Value Data Loss Business Intelligence Password Cortana Sports Excel Computing Scam Digital Payment Disaster End of Support Customer Relationship Management Hacker Hosted Solution Router Downtime Data Breach Robot Current Events Comparison Tablet Securty Project Management Google Maps Digital Company Culture Management User Solid State Drive Computer Repair Websites Social Networking Social Engineering Flexibility Black Market Social Fax Server Cryptocurrency Wireless DDoS Laptop Avoiding Downtime Business Growth Data Security Word Machine Learning Net Neutrality Distributed Denial of Service eWaste YouTube Chrome Conferencing Unified Communications Settings Public Cloud Cooperation Redundancy Vendor Computer Accessories Monitoring Identity Theft Processors USB IT service Gaming Console Evernote Co-managed IT Trending Presentation User Error Webcam Mouse Politics Text Messaging Virtual Reality Virtual Desktop Start Menu Bluetooth Tech Terms Automobile Specifications Safety Emails Statistics Vulnerabilities Mobile Technology Programming Chromebook Lifestyle Network Congestion Computing Infrastructure Hack Documents Software as a Service Heating/Cooling Uninterrupted Power Supply How To Entertainment Google Docs Vulnerability Private Cloud Storage Experience Inbound Marketing Download Bitcoin Cleaning Streaming Media Monitors Telephony Data Protection Office Tips Pain Points Retail Microchip Taxes Displays Reading Fiber-Optic Samsung Database Processing Public Speaking Get More Done Society WannaCry Downloads HTML Health IT Employer Employee Relationship Telephone System Managed IT Service Shortcut Turn Key Corporate Profile G Suite Mobile Security Printer Server Micrsooft Time Management Freedom of Information Device Management Entrepreneur Upselling Business Managemenet Software License Licensing Trends Troubleshooting Trojan Drones Assessment SharePoint Content Management Hacks Physical Security Multi-Factor Security Cost Bookmark Organize Tip of the week Relocation Fraud Tablets Tactics Google Play HIPAA Google Calendar Video Surveillance Banking Botnet Devices Environment Saving ZTime online Currency Processor Competition Permissions VoIP Language Sync UTM Content Electronic Payment Touchscreen News Browsers Knowledge IT Plan Enterprise Resource Planning Medical IT Business Owner Consultation Notifications CCTV Legislation Error switches Writing Virtual Assistant Harddrive LinkedIn Reliable Computing email scam Addiction Security Cameras IP Address Music Technology Tips Debate Business Metrics Computer Malfunction Accountants A.I. User Tip Navigation Application Audit GPS In Internet of Things Multi-factor Authentication Human Resources Webinar Upgrades Fake News Telephone Data Analysis LiFi Skype Migration Connected Devices Professional Services Data Warehousing External Harddrive Archive Wireless Headphones Emergency Hard Drive Disposal Scalability Network Management GDPR Access Motion Sickness Equifax Fleet Tracking Thin CLient Messenger Tracking Tech Digital Signature Work/Life Balance Computer Care 3D Point of Contact Ebay Device security MSP Deep Learning Microsoft Excel Meetings Nanotechnology Social Network Fileless Malware Teamwork Visible Light Communication Memory Desktop Finance Voice over Internet Protocol Google Drive Windows Server 2008 Smart Phones Rental Service IT consulting Business Cards Cabling Service Level Agreement Modem Best Practives Spyware Mobile Payment Web Server Startup Asset Tracking Proxy Server Recycling Leadership Books Unified Threat Management Workers Backup and Disaster Recovery Term Electricity Printing Adminstration Pirating Information Analytic Wi-Fi Administrator Username Electronic Medical Records PDF Supercomputer Screen Reader Customer Resource management Directions Best Available Keyboard Microserver Advertising Flash Product Reviews Gamification Recording CIO Windows 7 Windows XP Piracy Worker Upload SSID Domains Staffing Google Wallet cache Television Read Smart Tech Distribution Dark Web Managing Stress CrashOverride Regulation Capital Printers Productuvuty 3D Printing