facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Problem with E-Waste is Worse Than We Thought

b2ap3_thumbnail_ewaste_is_a_problem_400.jpgSo you got yourself a shiny new laptop. That’s great, but what are you going to do with your old device? The right thing to do is to dispose of it with a company that handles e-waste properly. Otherwise, if you just chuck it in the trash, you’ll be contributing to an already serious environmental problem.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Smartphones Quick Tips User Tips Mobile Devices Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Social Media Android Network Productivity Collaboration Mobile Office Virtualization Data Backup Server Mobile Device Management Communication Smartphone Data Recovery Miscellaneous Tech Term Ransomware Windows 10 communications Upgrade Unified Threat Management Windows IT Support Holiday Operating System Remote Monitoring Passwords Facebook Managed IT services BYOD Remote Computing Vendor Management Mobile Computing Apps Cybersecurity Phishing Users Automation WiFi BDR Apple Data Management The Internet of Things Marketing Mobile Device Analytics History Firewall Outsourced IT Managed IT Services Alert Browser Artificial Intelligence App Save Money Internet of Things Encryption IT Consultant Big data Bring Your Own Device Maintenance Printer Antivirus Cloud Computing Gmail Health Office Content Filtering Going Green Spam Office 365 Bandwidth Managed IT Help Desk Budget Wireless Technology Tech Support Saving Time Two-factor Authentication Virus Search Business Technology Cybercrime Lithium-ion Battery Training Best Practice Information Technology Windows 10 Cost Management Windows 8 Outlook Hiring/Firing Hard Drives Healthcare Access Control Computers VPN Travel Recovery Blockchain Phone System Employer-Employee Relationship Update Hacking IBM Money Document Management Humor Running Cable Compliance Mobility Proactive IT Data storage Customer Service Administration Applications Twitter It Management Intranet Website Education Government Legal Managed Service Networking iPhone Risk Management Regulations Save Time SaaS Information File Sharing Hard Drive Law Enforcement Augmented Reality PowerPoint Solid State Drive User Computer Repair Social Networking Social Engineering Black Market Flexibility Social Cryptocurrency Wireless Laptop DDoS Data Security Business Growth Avoiding Downtime Patch Management Data Loss Machine Learning Current Events Scam Word Paperless Office Telephone Systems Value Business Intelligence Sports Password Cortana Data Breach Excel Digital Payment Disaster Computing Digital Hosted Solution Hacker Router Downtime Project Management End of Support Customer Relationship Management Fax Server Websites Robot Management Comparison Tablet Securty Company Culture Google Maps Virtual Reality Software as a Service Politics Mouse Automobile Webcam Specifications Safety Emails Text Messaging Uninterrupted Power Supply Bluetooth Virtual Desktop Statistics Chromebook Programming Vulnerability Computing Infrastructure Hack Network Congestion Bitcoin Documents How To Google Docs Entertainment Data Protection Heating/Cooling Experience Storage Download Private Cloud Cleaning Streaming Media Cooperation Monitors Inbound Marketing Office Tips Conferencing Telephony Vendor Retail Microchip Taxes Distributed Denial of Service Pain Points User Error Redundancy YouTube eWaste Co-managed IT Net Neutrality Monitoring Chrome Unified Communications Settings Public Cloud Evernote Identity Theft Lifestyle Processors Computer Accessories Start Menu Tech Terms IT service USB Trending Mobile Technology Presentation Gaming Console Vulnerabilities Proxy Server Application Device security MSP In Internet of Things Harddrive Microsoft Excel Modem Upgrades Human Resources Debate Computer Care Desktop Finance Microserver Skype Google Drive Windows Server 2008 Term Nanotechnology Social Network GPS Archive Electronic Medical Records LiFi External Harddrive Spyware Mobile Payment Directions Startup Asset Tracking Motion Sickness Recording Business Cards Service Level Agreement Scalability Dark Web Work/Life Balance Digital Signature Username Get More Done Point of Contact SSID Deep Learning Unified Threat Management Backup and Disaster Recovery Messenger Tracking Electricity Printing Gamification Thin CLient Turn Key Windows 7 Processing Screen Reader Customer Resource management Rental Service Meetings 3D Printer Server Ebay Health IT Visible Light Communication Memory Teamwork Smart Phones cache Television Managed IT Service Smart Tech Distribution Web Server Trojan IT consulting Piracy Upload Cabling WannaCry Downloads Bookmark HTML Wi-Fi Administrator Analytic PDF Fiber-Optic Database Books Workers Recycling Organize Best Available Keyboard Mobile Security Leadership Product Reviews Time Management Freedom of Information CIO Google Play Telephone System Supercomputer Adminstration Pirating Information Corporate Profile Advertising Flash Worker Assessment SharePoint Staffing Processor Google Wallet Domains Multi-Factor Security Cost Read Windows XP Software License Trends Google Calendar Browsers Society Public Speaking Devices Tip of the week Medical IT Displays Fraud Tactics Reading Samsung Shortcut UTM Content G Suite Touchscreen News Security Cameras Micrsooft Employer Employee Relationship Device Management Webinar VoIP User Tip Licensing Business Managemenet Consultation Navigation Drones Troubleshooting Legislation Error Hacks Physical Security Content Management Knowledge Entrepreneur IT Plan Enterprise Resource Planning Technology Tips Data Analysis HIPAA Accountants A.I. Banking Botnet Upselling Virtual Assistant Professional Services Environment email scam Addiction Relocation Tablets Permissions Language Competition Multi-factor Authentication Sync Fake News GDPR Electronic Payment Video Surveillance online Currency Audit Saving ZTime Data Warehousing Tech Business Owner Wireless Headphones Telephone Notifications CCTV Migration Connected Devices LinkedIn Access Fileless Malware Music IP Address Equifax Fleet Tracking Business Metrics Computer Malfunction Best Practives Emergency Hard Drive Disposal switches Voice over Internet Protocol Writing Network Management Reliable Computing Productuvuty 3D Printing Managing Stress CrashOverride Regulation Capital Printers