facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Excel to Excel-lerate

Tip of the Week: Using Excel to Excel-lerate

Microsoft Excel has been around for quite some time, but it’s one of the trickier Microsoft Office solutions to master. You might know all about some of the more common Excel tricks, but do you know these power shortcuts that can help you fully take advantage of the spreadsheet software? Here are some obscure Excel shortcuts that your organization can take advantage of.

0 Comments
Continue reading

Formulas and Reactions 101: Microsoft Excel 2013 Edition

b2ap3_thumbnail_microsoft_excel_400.jpgDo you have trouble keeping track of your budget and expenses within your company? It's not your fault - prices change over time, and paperwork can be tedious to go through. By taking advantage of Microsoft Excel's basic mathematical formulas, you can simplify the way that keep track of your business's budget.

0 Comments
Continue reading

Tip: 3 Steps to Check Excel Workbooks for Errors

b2ap3_thumbnail_excel400.pngWorking on a team means that projects are passed from person to person. If one person makes an error, passes it on, and the error is not caught, then the whole project is in jeopardy. When working in Excel with a team, here are three steps to take to help you find mistakes and keep the project moving forward error-free.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Smartphones Mobile Devices Quick Tips User Tips Innovation Gadgets Business Continuity VoIP Microsoft Office Disaster Recovery Social Media Android Network Collaboration Data Backup Productivity Mobile Office Virtualization Server Mobile Device Management Communication Smartphone Miscellaneous Data Recovery Upgrade Ransomware Windows 10 Tech Term communications IT Support Unified Threat Management Windows Operating System Holiday Passwords Remote Monitoring Facebook Cybersecurity BYOD Remote Computing Vendor Management Managed IT services Mobile Computing Apps Phishing Users WiFi Automation BDR The Internet of Things Apple Mobile Device Data Management Analytics Marketing Outsourced IT Firewall History App Browser Internet of Things Managed IT Services Save Money Alert Artificial Intelligence IT Consultant Encryption Big data Gmail Maintenance Printer Bandwidth Content Filtering Cloud Computing Health Going Green Office Office 365 Bring Your Own Device Antivirus Spam Business Technology Hiring/Firing Hard Drives Virus Tech Support Cybercrime Saving Time Lithium-ion Battery Windows 10 Best Practice Information Technology Managed IT Cost Management Help Desk Wireless Technology Budget Training Windows 8 Outlook Search Two-factor Authentication Money Document Management Blockchain Recovery Employer-Employee Relationship Computers VPN Travel Hacking IBM Phone System Healthcare Update Access Control File Sharing Hard Drive Humor Website SaaS Government Running Cable Proactive IT Mobility iPhone Information Law Enforcement Compliance Intranet Twitter Education Data storage Augmented Reality PowerPoint Risk Management Applications Networking Legal Save Time Managed Service Administration It Management Regulations Customer Service Wireless Paperless Office Sports DDoS Patch Management Comparison Tablet Company Culture Avoiding Downtime Computing Google Maps Data Loss Disaster End of Support Scam Hosted Solution Computer Repair Robot Social Engineering Social Networking Retail Word Data Breach Management Securty Excel Password Cortana Project Management Solid State Drive Value Digital Websites Flexibility Customer Relationship Management Current Events Black Market Hacker Cryptocurrency Laptop Machine Learning Telephone Systems Business Growth User Business Intelligence Digital Payment Fax Server Router Downtime Social Data Security YouTube Documents Computer Accessories Identity Theft Entertainment Unified Communications Settings Heating/Cooling Trending Monitoring Inbound Marketing Storage Mouse Politics Virtual Reality Emails Redundancy Automobile Chromebook Programming Pain Points IT service Statistics Computing Infrastructure Network Congestion Hack Evernote eWaste How To Vulnerabilities Cooperation Download Bluetooth Private Cloud Streaming Media Vendor Start Menu Tech Terms Mobile Technology Processors Telephony Co-managed IT User Error Google Docs Microchip Taxes Software as a Service Gaming Console USB Distributed Denial of Service Net Neutrality Uninterrupted Power Supply Experience Presentation Webcam Monitors Chrome Vulnerability Cleaning Text Messaging Office Tips Specifications Safety Bitcoin Virtual Desktop Public Cloud Lifestyle Data Protection Conferencing Best Practives cache Software License Television Trends Thin CLient Displays online Currency Multi-Factor Security Cost 3D Society Ebay Digital Signature Tech Sync Smart Phones Micrsooft Voice over Internet Protocol Notifications CCTV Devices Teamwork Fileless Malware WannaCry Fraud Downloads Tactics Modem Business Metrics Computer Malfunction Time Management UTM Freedom of Information Content Proxy Server LinkedIn Reliable Computing Microserver Corporate Profile Drones In Internet of Things Assessment IT Plan SharePoint Enterprise Resource Planning Leadership PDF Electronic Medical Records Legislation Error Adminstration Pirating Information Term Recording Archive Accountants Tip of the week A.I. Permissions Language Best Available Keyboard Directions Skype Get More Done email scam Google Calendar Addiction Domains SSID Motion Sickness Printer Server Touchscreen Multi-factor Authentication News Dark Web Scalability Turn Key VoIP Point of Contact Trojan Consultation Migration Connected Devices switches Writing Health IT Messenger Tracking Knowledge Wireless Headphones Telephone Music Public Speaking Processing Upgrades Rental Service Meetings Organize Equifax Virtual Assistant Fleet Tracking Shortcut Managed IT Service Technology Tips Network Management Troubleshooting Web Server Device security Fake News MSP Upselling LiFi Entrepreneur Bookmark Cabling Audit Google Play Wi-Fi Analytic Administrator Desktop Data Warehousing Finance Environment Recycling Books Workers Nanotechnology Social Network Video Surveillance HIPAA Service Level Agreement Saving ZTime Deep Learning Electronic Payment Supercomputer Emergency Startup Hard Drive Disposal Asset Tracking Work/Life Balance Competition Processor Product Reviews Access Business Cards Business Owner Medical IT Read Webinar Microsoft Excel Username Visible Light Communication Memory Browsers Worker Unified Threat Management Computer Care Backup and Disaster Recovery Security Cameras Google Drive Windows Server 2008 Gamification Harddrive IT consulting User Tip Reading Samsung Screen Reader Customer Resource management Debate IP Address Spyware Piracy Mobile Payment Upload Human Resources Device Management Employer Employee Relationship Smart Tech Distribution GPS Application Navigation G Suite External Harddrive CIO Professional Services Content Management Hacks Physical Security HTML Advertising Flash Data Analysis Business Managemenet Licensing Electricity Fiber-Optic Printing Database GDPR Banking Botnet Mobile Security Windows 7 Windows XP Relocation Tablets Telephone System Staffing Google Wallet Regulation CrashOverride Capital Productuvuty 3D Printing Managing Stress Printers

toner1