facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Computer Software Can Probably Write a Better Story Than You

b2ap3_thumbnail_automated_writers_400.jpgArtificial intelligence is still a long way off, but this doesn’t stop people from trying to make major advancements in how AI thinks. Take, for example, a Japanese novella (a short novel) co-written by AI that almost won the Hoshi Shinichi Award literary prize. That’s the key word here, though: almost. It seems that AI still has quite a bit of progress to make before it can effectively replicate human creativity.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Hosted Solutions Managed Service Provider Business Productivity Productivity Email Malware IT Services Saving Money Efficiency Google Computer User Tips Innovation Small Business Collaboration IT Support Smartphones Data Backup VoIP IT Support Quick Tips Mobile Devices Network communications Business Continuity Microsoft Office Gadgets Social Media Data Recovery Android Disaster Recovery Cybersecurity Upgrade Communication Mobile Office Server Smartphone Virtualization Phishing Mobile Device Management Miscellaneous Vendor Management Ransomware Holiday Tech Term Operating System Windows Passwords Windows 10 Outsourced IT Internet of Things Users Unified Threat Management Mobile Device Managed IT Services Apps Facebook Remote Monitoring BDR Automation Data Management BYOD Remote Computing Managed IT services Apple Analytics Mobile Computing WiFi Windows 10 History The Internet of Things Artificial Intelligence Cloud Computing Marketing Training Browser Firewall Save Money App Encryption Alert Help Desk Big data Bandwidth Office 365 Spam Health Two-factor Authentication IT Consultant Information Technology Business Technology Office Maintenance Printer Managed IT Budget Hard Drives Access Control Content Filtering Gmail Going Green Windows 7 Government Cybercrime Bring Your Own Device Antivirus Search Tech Support Virus Hiring/Firing Managed Service Lithium-ion Battery Best Practice Computers Saving Time VPN Recovery Employer-Employee Relationship Retail Windows 8 Outlook Information Wireless Technology Healthcare Cost Management Project Management Humor Money Document Management iPhone Customer Service Phone System It Management IBM Networking Blockchain Travel Education Augmented Reality Data Loss Update Computing Hacking Hacker Save Time Law Enforcement Downtime Solid State Drive Avoiding Downtime Compliance Applications Data storage Flexibility Covid-19 Running Cable Conferencing Proactive IT Computer Repair Wireless File Sharing Hard Drive Current Events Data Security Storage Website Legal Customer Relationship Management Intranet Patch Management Mobility Twitter Regulations PowerPoint SaaS Password Value Risk Management Data Breach Administration Digital Wi-Fi Robot Business Intelligence Websites Securty Telephony Digital Payment Voice over Internet Protocol Machine Learning Router Telephone Systems Remote Work Software as a Service Comparison User Tablet Company Culture Black Market Virtual Desktop Cryptocurrency Social Laptop Social Networking Excel DDoS Business Growth Cooperation Vendor Monitoring Google Maps Social Engineering Paperless Office Management Word Scam Fax Server Sports Cortana Disaster Vulnerabilities Meetings Hosted Solution Net Neutrality End of Support Private Cloud Integration Chrome Virtual Assistant IT service Processors Microchip Taxes USB Start Menu Tech Terms Mobile Technology Distributed Denial of Service Computer Accessories Managed Services Provider Inbound Marketing Presentation Bluetooth Distribution Public Cloud Licensing Specifications Safety Trending Uninterrupted Power Supply Employee/Employer Relationship Pain Points Mouse Vulnerability Managed Services Memory Identity Theft Documents Bitcoin Managed IT Service Google Docs Entertainment Programming Experience Statistics Teamwork Heating/Cooling Data Protection Network Congestion Co-managed IT Cleaning User Error Monitors Downloads Virtual Reality Processor Office Tips Politics Automobile Smart Devices Emails Streaming Media Chromebook Gaming Console YouTube Multi-factor Authentication Unified Communications Settings Computing Infrastructure Hack Telephone eWaste Redundancy Lifestyle How To Webcam Text Messaging Professional Services Evernote Download Technology Tips Permissions Language Nanotechnology Administrator Social Network Device Management Environment Internet Service Provider Tech Hypervisor Desktop Books Finance Workers HIPAA Startup Asset Tracking Thin CLient Content Management Electronic Payment IT Assessment Fake News Fileless Malware Hybrid Cloud Microserver Business Cards Service Level Agreement Supercomputer 3D Ebay Business Managemenet Competition Audit Holidays Username Worker Smart Phones Business Owner Data Warehousing Proxy Server Azure Music Unified Threat Management Backup and Disaster Recovery Remote Working Modem Strategy switches Writing IP Address Access Electronic Medical Records Transportation Screen Reader Customer Resource management online Currency Emergency Hard Drive Disposal Term Get More Done Upgrades Reading Gamification Samsung Printer Server Optimization LiFi Smart Tech G Suite Leadership Human Resources Electronic Health Records Microsoft Excel Directions Display Turn Key Piracy Upload Employer Employee Relationship Adminstration Pirating Information Application Computer Care Recording HTML Memes Google Drive Windows Server 2008 Dark Web Free Resource Fiber-Optic Hacks Database Physical Security LinkedIn SSID Trojan How To Spyware Mobile Payment Health IT Organize Work/Life Balance Banking Botnet Telephone System Managing IT Services Processing Deep Learning Mobile Security Relocation Tablets Logistics Virtual Machines Visible Light Communication Multi-Factor Security Sync Cost Archive Surveillance Wasting Time Software License Trends Digital Signature Skype Electricity Printing IT consulting Devices IT Bookmark Fraud Notifications Tactics CCTV Remote Workers Cyber security Point of Contact cache Television Employer/Employee Relationships Business Metrics Computer Malfunction Upselling Virtual Private Network Google Play Telephone Service UTM Reliable Computing Content Microsoft 365 Webinar Advertising Flash Legislation In Internet of Things Error PDF Development Managing Costs CIO IT Plan Enterprise Resource Planning Video Surveillance WannaCry Windows XP Accountants A.I. Saving ZTime Time Management Freedom of Information Browsers Staffing Google Wallet email scam Addiction Best Available Keyboard Corporate Profile Medical IT Trend Micro Analytic Domains Assessment SharePoint User Tip Proactive Maintenance Society Motion Sickness Recycling Procurement Security Cameras Threats Displays Scalability Google Calendar Solutions Wireless Headphones Harddrive Video Conferencing Tip of the week Navigation Virtual Machine Micrsooft Migration Messenger Connected Devices Tracking Debate Product Reviews Public Speaking Equifax Fleet Tracking Read Communitications Touchscreen News Data Analysis Employees Drones Rental Service Network Management GPS Shortcut VoIP eCommerce MSP Cabling External Harddrive Troubleshooting Consultation SQL Server Web Server Entrepreneur Supply Chain Management Knowledge GDPR Best Practives Managing Risk Device security Capital Productuvuty Managing Stress 3D Printing Regulation Personal Information Financial CrashOverride Printers