facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Anti-Surveillance Technology Prevent NSA Spying, or Weaken National Security?

b2ap3_thumbnail_you_are_being_watched_400.jpgOn Saturday, July 21st 2014, the Hackers on Planet Earth (HOPE) conference took place in New York City. It's a place where hackers discuss ways to improve the society in which we live. One of the more controversial panelists, Edward Snowden, has suggested hackers pool their efforts into creating anti-surveillance technology to decrease government espionage.

Continue reading

What is the Future for Net Neutrality?

b2ap3_thumbnail_net_neutrality_no_monopoly_400.jpgThe issue of net neutrality is a hot topic in the United States, but not many people actually know what it is and how it affects their day-to-day routine. This is certainly an important topic that shouldn't be ignored, as it might very well affect all end users.

Continue reading

3 Green Earth Day Approved Technologies

b2ap3_thumbnail_impossiblygreen400.jpgWhile it is unlikely that you were able to take off work this Earth Day as a paid holiday, you can still celebrate at work by taking steps to make your office a greener place. New technologies are designed to be eco-friendly; by upgrading your office with these three techs, you can help the environment by saving trees and energy.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices User Tips Smartphones Innovation Gadgets Business Continuity Microsoft Office Disaster Recovery VoIP Social Media Android Network Collaboration Productivity Mobile Office Virtualization Data Backup Server Mobile Device Management Communication Smartphone Data Recovery Miscellaneous Ransomware Tech Term Windows 10 communications Upgrade Unified Threat Management Windows IT Support Holiday Passwords Remote Monitoring Facebook Operating System Remote Computing Vendor Management Apps Mobile Computing Phishing Cybersecurity Managed IT services BYOD WiFi BDR Users Automation Apple Mobile Device Analytics Marketing Data Management The Internet of Things Firewall Outsourced IT History App Managed IT Services Browser Alert Artificial Intelligence Save Money Internet of Things Encryption IT Consultant Big data Gmail Health Cloud Computing Content Filtering Office Going Green Bring Your Own Device Office 365 Spam Bandwidth Antivirus Maintenance Printer Saving Time Business Technology Cybercrime Lithium-ion Battery Best Practice Information Technology Outlook Cost Management Windows 8 Windows 10 Help Desk Training Wireless Technology Budget Managed IT Hiring/Firing Search Virus Hard Drives Tech Support Two-factor Authentication Healthcare Computers VPN Phone System Travel Blockchain Recovery Employer-Employee Relationship IBM Update Hacking Money Document Management Access Control Mobility It Management iPhone Government Website Twitter Legal Intranet Networking Education Regulations Applications Risk Management Managed Service SaaS Augmented Reality PowerPoint Save Time Law Enforcement Humor Administration Compliance File Sharing Hard Drive Data storage Information Running Cable Customer Service Proactive IT Wireless Social Networking Cryptocurrency Avoiding Downtime DDoS Laptop Social Engineering Data Security Business Growth Patch Management Data Loss Current Events Excel Word Scam Paperless Office Data Breach Password Cortana Customer Relationship Management Value Sports Computing Machine Learning Disaster Fax Server Digital Business Intelligence Hosted Solution Telephone Systems Project Management Hacker End of Support Digital Payment Websites Robot Router Downtime Securty Comparison Tablet Solid State Drive User Management Company Culture Flexibility Google Maps Social Computer Repair Black Market Documents Vulnerabilities Virtual Reality Bitcoin Inbound Marketing Politics Entertainment Statistics Automobile Heating/Cooling Programming Google Docs Emails Data Protection Network Congestion Experience Chromebook Storage Cleaning Pain Points Computing Infrastructure Hack Monitors How To Office Tips Private Cloud User Error Streaming Media Download Co-managed IT Retail eWaste Redundancy YouTube Unified Communications Settings Telephony Net Neutrality Conferencing Evernote Microchip Taxes Lifestyle Gaming Console Distributed Denial of Service Chrome Processors Webcam IT service Monitoring Public Cloud USB Cooperation Text Messaging Start Menu Tech Terms Mobile Technology Presentation Computer Accessories Vendor Identity Theft Software as a Service Specifications Safety Trending Bluetooth Virtual Desktop Uninterrupted Power Supply Vulnerability Mouse Turn Key Electricity Printing Navigation Skype Work/Life Balance Network Management In Internet of Things Printer Server Digital Signature Archive Deep Learning Equifax Fleet Tracking Data Analysis Visible Light Communication Memory Leadership Trojan Windows 7 Teamwork Professional Services Device security Adminstration MSP Pirating Information IT consulting Nanotechnology Social Network Scalability cache Television Point of Contact GDPR Desktop Finance Motion Sickness Organize WannaCry Downloads PDF Tech Business Cards Service Level Agreement Startup Asset Tracking Messenger Tracking Corporate Profile Fileless Malware Advertising Unified Threat Management Flash Backup and Disaster Recovery Time Management Freedom of Information Best Available Keyboard Voice over Internet Protocol CIO Username Rental Service Meetings Domains Recycling Proxy Server Windows XP Screen Reader Customer Resource management Cabling Assessment SharePoint Modem Analytic Staffing Google Wallet Gamification Web Server Workers Google Calendar Term Product Reviews Society Piracy Upselling Upload Wi-Fi Administrator Webinar Tip of the week Public Speaking Electronic Medical Records Displays Smart Tech Distribution Books VoIP Directions Fiber-Optic Database Touchscreen News Shortcut Recording Read Micrsooft HTML Video Surveillance Supercomputer Troubleshooting Dark Web Saving ZTime Telephone System Worker Consultation Entrepreneur SSID Drones Mobile Security Knowledge Multi-Factor Security Cost Reading Samsung Technology Tips Environment Processing Software License Trends Virtual Assistant HIPAA Device Management Health IT Audit Electronic Payment Managed IT Service Business Managemenet Permissions Fraud Harddrive Language Tactics G Suite Fake News Competition Content Management Devices Debate Employer Employee Relationship Business Owner Bookmark Licensing Best Practives Data Warehousing UTM GPS Content Hacks Physical Security External Harddrive Writing Legislation Error Relocation Tablets Access Google Play Music IT Plan Enterprise Resource Planning Banking Botnet Emergency Hard Drive Disposal IP Address online Currency switches Microserver Computer Care Human Resources Processor email scam Addiction Sync Microsoft Excel Application Upgrades Accountants A.I. Browsers LinkedIn LiFi Thin CLient Google Drive Windows Server 2008 Medical IT Multi-factor Authentication 3D Ebay Notifications CCTV Smart Phones Wireless Headphones Telephone Reliable Computing Get More Done Spyware Mobile Payment Security Cameras Migration Connected Devices Business Metrics Computer Malfunction User Tip 3D Printing Printers CrashOverride Managing Stress Capital Regulation Productuvuty