facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Excel to Excel-lerate

Tip of the Week: Using Excel to Excel-lerate

Microsoft Excel has been around for quite some time, but it’s one of the trickier Microsoft Office solutions to master. You might know all about some of the more common Excel tricks, but do you know these power shortcuts that can help you fully take advantage of the spreadsheet software? Here are some obscure Excel shortcuts that your organization can take advantage of.

0 Comments
Continue reading

Formulas and Reactions 101: Microsoft Excel 2013 Edition

b2ap3_thumbnail_microsoft_excel_400.jpgDo you have trouble keeping track of your budget and expenses within your company? It's not your fault - prices change over time, and paperwork can be tedious to go through. By taking advantage of Microsoft Excel's basic mathematical formulas, you can simplify the way that keep track of your business's budget.

0 Comments
Continue reading

Tip: 3 Steps to Check Excel Workbooks for Errors

b2ap3_thumbnail_excel400.pngWorking on a team means that projects are passed from person to person. If one person makes an error, passes it on, and the error is not caught, then the whole project is in jeopardy. When working in Excel with a team, here are three steps to take to help you find mistakes and keep the project moving forward error-free.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Hackers Business Management Hardware Microsoft Workplace Tips Network Security Backup Hosted Solutions Managed Service Provider Business Productivity Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration IT Support VoIP Smartphones IT Support Data Backup Quick Tips Network Mobile Devices communications Business Continuity Microsoft Office Gadgets Disaster Recovery Cybersecurity Social Media Data Recovery Android Upgrade Mobile Office Server Communication Virtualization Phishing Smartphone Mobile Device Management Miscellaneous Ransomware Holiday Vendor Management Apps Operating System Windows 10 Managed IT Services Outsourced IT Windows Tech Term Passwords Facebook Unified Threat Management Users Internet of Things Mobile Device Remote Monitoring BDR Automation BYOD Remote Computing Apple Data Management Analytics Managed IT services Mobile Computing Windows 10 WiFi History Marketing The Internet of Things Cloud Computing Artificial Intelligence Training Firewall Browser Save Money Spam App Alert Help Desk Business Technology Big data Encryption Information Technology Office Health Office 365 Bandwidth IT Consultant Two-factor Authentication Government Cybercrime Hard Drives Maintenance Printer Content Filtering Going Green Access Control Managed IT Budget Bring Your Own Device Windows 7 Antivirus Gmail Search Windows 8 Outlook Recovery Hiring/Firing Employer-Employee Relationship Retail Information Virus Cost Management Lithium-ion Battery Saving Time Tech Support Best Practice Computers VPN Healthcare Wireless Technology Managed Service Data Loss Networking Money Document Management iPhone Remote Work Project Management Humor Hacking Computing IBM Travel Education Augmented Reality Update Phone System It Management Data Security Customer Service Blockchain Save Time Vendor Conferencing Storage Website Downtime File Sharing Legal Data Breach Hard Drive Avoiding Downtime Regulations Mobility Proactive IT Computer Repair Running Cable Value Password Covid-19 SaaS Voice over Internet Protocol Hacker Intranet Twitter Law Enforcement Customer Relationship Management Solid State Drive PowerPoint Compliance Applications Data storage Risk Management Current Events Flexibility Wireless Patch Management Administration Laptop Digital Payment DDoS Business Growth Scam Router Fax Server Comparison Tablet Monitoring Google Maps Word Company Culture Digital Paperless Office Websites Sports Social Networking Management Social Engineering Cortana Disaster Vulnerabilities Hosted Solution Excel End of Support Software as a Service Robot Meetings Private Cloud Securty Wi-Fi User Telephony Machine Learning Virtual Desktop Social Black Market Net Neutrality Telephone Systems Cryptocurrency Business Intelligence Cooperation Memory Public Cloud Teamwork Licensing Heating/Cooling Google Docs Entertainment Experience Processor Cost Cleaning Computer Accessories Identity Theft Redundancy Monitors Lifestyle Inbound Marketing Office Tips Solutions Evernote Trending Politics eWaste Mouse Virtual Reality Virtual Assistant YouTube Professional Services Unified Communications Settings Multi-factor Authentication Automobile Pain Points Emails Programming Integration Statistics Telephone Chromebook Start Menu Tech Terms Mobile Technology Computing Infrastructure Hack Network Congestion How To Processors USB Managed Services Provider Download Uninterrupted Power Supply IT service Presentation Vulnerability Streaming Media Bitcoin Gaming Console How To Bluetooth Employee/Employer Relationship Smart Devices Managed Services Microchip Taxes Specifications Safety Data Protection Webcam Co-managed IT Managed IT Service Distribution Distributed Denial of Service Text Messaging User Error Downloads Chrome Documents Visible Light Communication Content Management Employer/Employee Relationships Mobile Security Communitications Time Management Freedom of Information Business Managemenet Google Play Telephone Service Telephone System Hacks Physical Security PCI DSS Corporate Profile Microsoft 365 Software License Trends Relocation Tablets Assessment SharePoint Thin CLient Managing Costs Multi-Factor Security Banking Botnet Supply Chain Management IT consulting 3D Ebay PDF Google Calendar Smart Phones online Currency Browsers Devices Sync Internet Service Provider Tip of the week Medical IT Fraud Trend Micro Tactics VoIP Advertising Flash User Tip Proactive Maintenance UTM Content Best Available Keyboard IT Assessment Touchscreen News CIO Security Cameras Threats Notifications CCTV Regulations Compliance Best Practives IT Plan Enterprise Resource Planning Reliable Computing Consultation Staffing Google Wallet Leadership LinkedIn Navigation Virtual Machine Legislation Error Business Metrics Computer Malfunction Domains Remote Working Knowledge Windows XP Adminstration Pirating Information Addiction Technology Tips Society Data Analysis Employees Accountants A.I. In Internet of Things Public Speaking Displays email scam eCommerce Financial Data Audit Archive SQL Server Shortcut Electronic Health Records Fake News Micrsooft Skype Microserver GDPR Managing Risk Migration Connected Devices Scalability Entrepreneur Memes Data Warehousing Drones Tech Hypervisor Wireless Headphones Motion Sickness Troubleshooting Holidays Network Management Messenger Tracking Environment Access Fileless Malware Hybrid Cloud Equifax Fleet Tracking HIPAA Managing IT Services Emergency Hard Drive Disposal Point of Contact Get More Done Telework Computer Care Permissions Language Printer Server Proxy Server Azure Device security MSP Competition Surveillance Microsoft Excel Upselling Turn Key Modem Strategy Rental Service Electronic Payment Video Surveillance Trojan Electronic Medical Records Transportation Desktop Finance Cabling IT Google Drive Windows Server 2008 Term Nanotechnology Social Network Web Server Business Owner Remote Workers Recording Business Cards Optimization Service Level Agreement Books Workers Spyware Mobile Payment Music Recycling Saving ZTime Organize Directions Display Startup Asset Tracking Administrator IP Address Virtual Private Network switches Writing Analytic FinTech Electricity Printing Dark Web Free Resource Username Application Development Upgrades Product Reviews SSID Unified Threat Management Backup and Disaster Recovery Supercomputer Human Resources Debate Read Health IT Gamification Worker Harddrive Processing Screen Reader Customer Resource management Data Storage LiFi Logistics Piracy Virtual Machines Upload Reading Samsung cache Television Wasting Time Smart Tech Procurement GPS WannaCry External Harddrive Work/Life Balance Device Management Webinar Bookmark HTML G Suite Digital Signature Video Conferencing Deep Learning Fiber-Optic Cyber security Database Employer Employee Relationship Managing Stress 3D Printing CrashOverride Financial Regulation Capital Printers Productuvuty Personal Information

toner1