facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Excel to Excel-lerate

Tip of the Week: Using Excel to Excel-lerate

Microsoft Excel has been around for quite some time, but it’s one of the trickier Microsoft Office solutions to master. You might know all about some of the more common Excel tricks, but do you know these power shortcuts that can help you fully take advantage of the spreadsheet software? Here are some obscure Excel shortcuts that your organization can take advantage of.

0 Comments
Continue reading

Formulas and Reactions 101: Microsoft Excel 2013 Edition

b2ap3_thumbnail_microsoft_excel_400.jpgDo you have trouble keeping track of your budget and expenses within your company? It's not your fault - prices change over time, and paperwork can be tedious to go through. By taking advantage of Microsoft Excel's basic mathematical formulas, you can simplify the way that keep track of your business's budget.

0 Comments
Continue reading

Tip: 3 Steps to Check Excel Workbooks for Errors

b2ap3_thumbnail_excel400.pngWorking on a team means that projects are passed from person to person. If one person makes an error, passes it on, and the error is not caught, then the whole project is in jeopardy. When working in Excel with a team, here are three steps to take to help you find mistakes and keep the project moving forward error-free.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Hackers Business Management Hardware Microsoft Workplace Tips Network Security Productivity Backup Business Managed Service Provider Hosted Solutions Email Productivity Malware IT Services Efficiency Saving Money Google Innovation Small Business User Tips Collaboration Computer IT Support Quick Tips Data Backup VoIP Network IT Support Smartphones Business Continuity Mobile Devices communications Data Recovery Microsoft Office Gadgets Disaster Recovery Android Cybersecurity Social Media Smartphone Upgrade Mobile Office Phishing Communication Server Virtualization Miscellaneous Mobile Device Management Passwords Mobile Device Ransomware Vendor Management Windows Users Holiday Operating System Windows 10 BDR Apps Outsourced IT Tech Term Internet of Things Managed IT Services Unified Threat Management Remote Monitoring Facebook Automation BYOD Apple Mobile Computing Data Management Analytics WiFi Remote Computing Managed IT services Windows 10 The Internet of Things Marketing Training History Browser Artificial Intelligence Cloud Computing Save Money Firewall Help Desk Covid-19 Business Technology Encryption Big data Spam Alert Health App IT Consultant Information Technology Office 365 Budget Two-factor Authentication Bandwidth Office Managed Service Content Filtering Going Green Information Hard Drives Bring Your Own Device Access Control Maintenance Printer Antivirus Gmail Windows 7 VPN Blockchain Managed IT Government Cybercrime Retail Lithium-ion Battery Best Practice Networking Wi-Fi Cost Management Windows 8 Outlook Document Management Hiring/Firing Healthcare Remote Work Wireless Technology Saving Time Computers Tech Support Search Virus Recovery Employer-Employee Relationship Phone System iPhone Hacking Project Management IBM Money Augmented Reality Computing Humor Customer Service It Management Data Security Travel Storage Education Conferencing Data Loss Update Risk Management Voice over Internet Protocol Current Events Data Breach Laptop Password Value Legal Save Time Hacker Downtime Customer Relationship Management Regulations PowerPoint SaaS Computer Repair Running Cable Vendor Proactive IT File Sharing Administration Hard Drive Wireless Law Enforcement Applications Twitter Intranet Mobility Website Patch Management Solid State Drive Compliance Avoiding Downtime Data storage Flexibility Cryptocurrency Word Meetings Monitoring Net Neutrality Business Intelligence Private Cloud Cortana Business Growth Chrome Digital Payment Excel Digital Telephony Websites Router Management Machine Learning Employee/Employer Relationship Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Fax Server Cooperation Software as a Service Company Culture Sports User Disaster End of Support Social Networking Hosted Solution Virtual Desktop Social Robot Securty Google Maps DDoS Social Engineering Scam Black Market Redundancy Smart Devices Computing Infrastructure Hack Pain Points Memory How To eWaste Google Docs Managed Services Provider Evernote Co-managed IT Experience Video Conferencing User Error Download Monitors Virtual Assistant Cleaning How To Office Tips Multi-factor Authentication Managed Services Telephone Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Mobile Technology YouTube Lifestyle Distributed Denial of Service USB Managed IT Service Trending Presentation Gaming Console Unified Communications Settings Public Cloud Licensing Uninterrupted Power Supply Mouse Specifications Safety Vulnerability Text Messaging Processor Webcam Statistics Bitcoin Programming Identity Theft IT service Network Congestion Documents Data Protection Notifications Distribution Entertainment Solutions Teamwork Heating/Cooling Politics Professional Services Virtual Reality Employees Downloads Emails Bluetooth Streaming Media Automobile Inbound Marketing Cost Integration Chromebook Data Storage Deep Learning Devices Messenger Tracking Domains Holidays Tip of the week Work/Life Balance Fraud Tactics Read Fileless Malware Hybrid Cloud Google Calendar Rental Service Modem Public Speaking Strategy Touchscreen News Visible Light Communication Proxy Server Azure VoIP Procurement UTM Content Term Shortcut Consultation IT consulting Organization Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Web Server PCI DSS Accountants Business Managemenet A.I. Webinar Books Workers Troubleshooting Recording Optimization Communitications email scam Content Management Addiction Administrator Directions Entrepreneur Display Technology Tips Supercomputer HIPAA SSID Upselling Fake News Advertising Flash Dark Web Environment Free Resource Audit CIO Supply Chain Management Processing Competition Data Warehousing Windows XP AI Wireless Headphones Worker Health IT Electronic Payment Video Surveillance Staffing Internet Service Provider Google Wallet Migration online Currency Connected Devices Regulations Compliance Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal IT Assessment Society Network Management Wasting Time Access Saving ZTime Device security LinkedIn MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel G Suite Bookmark Computer Care Remote Working Micrsooft Google Play Application Telephone Service Harddrive Google Drive Windows Server 2008 Supply Chains Nanotechnology Social Network Employer/Employee Relationships Human Resources Debate Drones Desktop Finance Best Practives Hacks Physical Security Spyware Mobile Payment Financial Data Startup Skype Asset Tracking Relocation Tablets Microsoft 365 GPS Electronic Health Records Business Cards Archive Service Level Agreement Banking Botnet Managing Costs Username Medical IT Trend Micro Memes Permissions Language Unified Threat Management Backup and Disaster Recovery Microserver Sync Browsers External Harddrive Electricity Printing CCTV Digital Signature Security Cameras Threats 2FA Point of Contact Screen Reader Customer Resource management User Tip Proactive Maintenance Managing IT Services Gamification cache Thin CLient Television switches Telework Writing Smart Tech Reliable Computing 3D Ebay Surveillance Music Piracy Upload Get More Done Business Metrics Computer Malfunction Navigation Virtual Machine Upgrades HTML Printer Server eCommerce IT Fiber-Optic Database Turn Key In Internet of Things Data Analysis Smart Phones WannaCry Remote Workers Trojan GDPR Managing Risk Time Management Freedom of Information LiFi Remote Analytic Telephone System Printers PDF SQL Server Corporate Profile Virtual Private Network Recycling Mobile Security Assessment Leadership SharePoint FinTech Multi-Factor Security Product Reviews Organize Scalability Adminstration Pirating Information Development Software License Trends Motion Sickness Best Available Tech Keyboard Hypervisor Regulation CrashOverride Reviews 3D Printing Capital Personal Information Productuvuty Financial Managing Stress

toner1