facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Unless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

0 Comments
Continue reading

The Problem with E-Waste is Worse Than We Thought

b2ap3_thumbnail_ewaste_is_a_problem_400.jpgSo you got yourself a shiny new laptop. That’s great, but what are you going to do with your old device? The right thing to do is to dispose of it with a company that handles e-waste properly. Otherwise, if you just chuck it in the trash, you’ll be contributing to an already serious environmental problem.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer User Tips Smartphones Quick Tips Mobile Devices Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Android Social Media Network Productivity Collaboration Mobile Office Data Backup Virtualization Server Smartphone Mobile Device Management Communication Miscellaneous Data Recovery Upgrade Windows 10 Tech Term communications Ransomware Unified Threat Management Windows IT Support Holiday Remote Monitoring Operating System Passwords Facebook Mobile Computing Phishing Vendor Management BYOD Remote Computing Apps Managed IT services Cybersecurity Users WiFi BDR Automation Mobile Device Analytics Data Management The Internet of Things Apple Marketing History Outsourced IT Firewall Alert Save Money Managed IT Services Artificial Intelligence Internet of Things App Browser Big data IT Consultant Encryption Office Maintenance Printer Cloud Computing Bring Your Own Device Antivirus Health Office 365 Spam Bandwidth Gmail Content Filtering Going Green Tech Support Virus Help Desk Cost Management Wireless Technology Business Technology Search Budget Hiring/Firing Hard Drives Two-factor Authentication Training Windows 10 Managed IT Windows 8 Best Practice Information Technology Outlook Lithium-ion Battery Saving Time Cybercrime Access Control Healthcare Update Hacking Blockchain Money Phone System Document Management Computers Recovery VPN Employer-Employee Relationship IBM Travel Education Mobility Networking Augmented Reality Humor Legal PowerPoint Regulations It Management Risk Management Administration SaaS Save Time Applications Managed Service Law Enforcement Customer Service Compliance Running Cable iPhone Proactive IT Data storage Website File Sharing Government Hard Drive Intranet Information Twitter Retail Business Growth Customer Relationship Management Word Social Engineering Value Password Cortana Data Security Hacker Paperless Office Patch Management Sports Business Intelligence Data Loss Computing Disaster Digital Payment End of Support Router Downtime Hosted Solution Scam Machine Learning User Robot Data Breach Current Events Telephone Systems Securty Avoiding Downtime Comparison Tablet Company Culture Social Computer Repair Digital Solid State Drive Wireless Project Management DDoS Websites Social Networking Flexibility Black Market Fax Server Excel Cryptocurrency Management Laptop Google Maps Virtual Reality Experience Politics Uninterrupted Power Supply Monitors Automobile Streaming Media Vulnerabilities Cleaning Emails eWaste Vulnerability Chromebook Bitcoin Gaming Console Office Tips Computing Infrastructure Hack Data Protection YouTube How To Text Messaging Webcam Net Neutrality Unified Communications Download Settings Chrome Processors Private Cloud USB Presentation Telephony Cooperation Microchip Computer Accessories Taxes Redundancy Conferencing Inbound Marketing IT service Distributed Denial of Service Vendor Specifications Safety Virtual Desktop Co-managed IT Evernote User Error Trending Public Cloud Mouse Documents Monitoring Bluetooth Entertainment Pain Points Heating/Cooling Identity Theft Programming Storage Statistics Start Menu Tech Terms Network Congestion Mobile Technology Lifestyle Software as a Service Google Docs Telephone IT consulting In Internet of Things Video Surveillance Domains Google Drive Migration Windows Server 2008 Connected Devices Best Practives Tech Wireless Headphones Voice over Internet Protocol Analytic Public Speaking Spyware Mobile Payment Network Management Saving ZTime Recycling Fileless Malware Equifax Fleet Tracking Shortcut Electricity Printing Microserver Advertising Flash Motion Sickness Proxy Server Device security MSP CIO Scalability Modem Product Reviews Nanotechnology Social Network Windows XP Debate Electronic Medical Records Read Troubleshooting Desktop Windows 7 Finance Staffing Harddrive Google Wallet Messenger Tracking Term Entrepreneur GPS Displays Recording HIPAA cache Business Cards Television Service Level Agreement Get More Done Society Rental Service Meetings Directions Environment Startup Asset Tracking SSID Competition WannaCry Unified Threat Management Downloads Backup and Disaster Recovery Turn Key External Harddrive Device Management Web Server Dark Web Electronic Payment Username Printer Server Micrsooft Cabling Screen Reader Customer Resource management Wi-Fi Administrator Health IT Content Management Business Owner Time Management Freedom of Information Gamification Trojan Drones Books Workers Processing Business Managemenet Corporate Profile 3D Ebay IP Address Assessment Piracy SharePoint Upload Thin CLient Supercomputer Managed IT Service Smart Tech Distribution Organize Worker Application Fiber-Optic Google Calendar Database Smart Phones Permissions Language Bookmark online Currency Human Resources HTML Tip of the week VoIP Telephone System Touchscreen Mobile Security News Reading Samsung Google Play switches Adminstration Writing G Suite Pirating Information Consultation Software License Trends Music Leadership Employer Employee Relationship Processor LinkedIn Knowledge Multi-Factor Security Cost Upgrades Licensing Medical IT Digital Signature Fraud Technology Tips Tactics Hacks Physical Security Browsers Devices Virtual Assistant Webinar Audit LiFi Banking Botnet User Tip Archive UTM Fake News Content Relocation Tablets Security Cameras Skype Teamwork Sync IT Plan Data Warehousing Enterprise Resource Planning Navigation Legislation Error Deep Learning Point of Contact Professional Services Access email scam Addiction Notifications Work/Life Balance CCTV Data Analysis PDF Emergency Accountants Hard Drive Disposal A.I. Computer Care Visible Light Communication Business Metrics Memory Computer Malfunction Multi-factor Authentication Microsoft Excel Upselling Reliable Computing GDPR Best Available Keyboard 3D Printing CrashOverride Managing Stress Regulation Capital Productuvuty Printers

toner1