facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Block Annoyances from Facebook

Tip of the Week: How to Block Annoyances from Facebook

Facebook is a great tool to connect with people in both your personal and professional life, but having a business page on Facebook can attract a lot of attention--and it’s not necessarily wanted in certain cases. For example, what if someone started slinging expletives at your page without your consent? This doesn’t just hurt your feelings; it makes you look bad. This week’s tip is dedicated to blocking unwanted content on your Facebook page.

0 Comments
Continue reading

Social Media Pros and Cons

Social Media Pros and Cons

As a technology, social media has been a revelation for individuals and businesses, alike. From a technology management perspective, it also has produced a lot of wasted man-hours over that time. Today, we will look at the pros and cons of social media for the small and medium-sized business, and how to get so the use of it is a net-positive position for your company.

0 Comments
Continue reading

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

0 Comments
Continue reading

Tip of the Week: How to Leverage 2FA on Facebook

Tip of the Week: How to Leverage 2FA on Facebook

If you’re like its over 2.19 billion other active users, Facebook has quite a bit of your personal information stored in it, and the risks that this implies only grow if your business is also represented on the social network. If your account isn’t protected as much as it could be, you could find yourself at risk of identity theft or other crimes. This is why we recommend activating two-factor authentication on Facebook.

0 Comments
Continue reading

Facebook, Gmail, and Slack are Becoming More Collaborative

Facebook, Gmail, and Slack are Becoming More Collaborative

In the modern business setting, collaboration drives productivity. As a result, many software developers are producing software with collaboration in mind. Since these developers are all in competition with each other for market share, they are typically trying to build on more advanced features to outmaneuver the other companies. Some of the biggest names in the industry have recently updated their products to make collaboration a priority. This week we’ll take a look at updates made to Facebook Workplace, Gmail, and Slack.

0 Comments
Continue reading

It's Time to Write a Eulogy for the Internet as We Know It

It's Time to Write a Eulogy for the Internet as We Know It

The Internet is prone to change. We all know this and have experienced it firsthand. Even though we may understand this reality, it can still be rather shocking when we’re confronted with it. The latest statistics show us how the current changes of the Internet have huge implications about how we’ll all interact with the web moving forward, which may spell doom for doing “online business as usual.”

0 Comments
Continue reading

Tip of the Week: 8 Facebook Messenger Features that Business Owners Will Love

Tip of the Week: 8 Facebook Messenger Features that Business Owners Will Love

Back in 2011, Facebook released their Messenger app. It was designed to be a chat system that could be used to communicate outside of the Facebook app. Since then, Facebook has provided Messenger with much more functionality than your average everyday messaging system. In fact, Messenger might now offer features that could be helpful for your business.

0 Comments
Continue reading

Tip of the Week: How to Post to Your Facebook News Feed, But Not Your Timeline

Tip of the Week: How to Post to Your Facebook News Feed, But Not Your Timeline

It’s a typical work day. You’re going about your business, when you decide to take a short break and check Facebook. Maybe you see a post that you’d like to share, but you’d rather not have that post on your timeline. While you could just delete it later, there’s a new feature that lets you share a post to your news feed, without posting it on your timeline.

0 Comments
Continue reading

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

The man who, between 2008 and 2009, stole the log-in credentials of Facebook users to spread his credential-stealing web links, has been sentenced to some hard time.

0 Comments
Continue reading

Tip of the Week: How to Prevent a Certain Facebook Friend From Seeing Your Post

Tip of the Week: How to Prevent a Certain Facebook Friend From Seeing Your Post

What makes Facebook so valuable is that it connects you to a wide variety of people. However, for many users, having such a diverse audience means holding back on sharing their personal opinions, which kind of takes the fun out of social networking. Did you know that Facebook allows you to exclude certain people from seeing your posts? For this week’s tip, we’ll show you how to take advantage of this feature.

0 Comments
Continue reading

Could You Go 99 Days Without Social Media?

b2ap3_thumbnail_lifi_400.jpgEmployees who are addicted to social media is a problem for modern businesses. Despite the professional networking benefits of social media, it can be a major distraction and time-waster. Before you lock down all social media websites on your network, you should first try to understand why humans have such a hard time leaving social media alone.

0 Comments
Continue reading

Tip of the Week: Find Success By Building a Professional Network On Facebook

b2ap3_thumbnail_facebook_networking_for_your_business_400.jpgIt’s a known fact that social media is a great asset for the modern business owner to leverage, but you wouldn’t believe how often it’s misconstrued as a waste of time. In fact, social media outlets like Facebook, Twitter, LinkedIn, and even YouTube, are so commonplace nowadays in the business world that your organization could fall behind others that properly utilize them. Facebook, in particular, is a powerful tool that can be used for online networking purposes.

0 Comments
Continue reading

If You Love Facebook, then You’ll Dig “Facebook at Work”

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has become the most popular social media outlet in the world, but in the eyes of corporate offices, it can be an immense time waster and productivity killer. However, it can be an incredibly efficient tool for connecting with other professionals, sort of like a pseudo-LinkedIn. To counter this stigma associated with social media in the workplace, Facebook has produced Facebook at Work.

0 Comments
Continue reading

Don’t Fall for Fake Facebook Friends

b2ap3_thumbnail_friend400.jpgIt's a trap! As more people subscribe to social media networking sites, we can expect more scammers to weasel their way into our friend bases. Especially when using Facebook, you'll need to be on the look out for scammers. Here are some warning signs of fake Facebook friends to consider in order to keep your profile safe.

0 Comments
Continue reading

Clean Up the Clutter from Your Facebook News Feed

b2ap3_thumbnail_NewsFeed400.jpgIn 2012, Facebook hit one billion active users. Facebook is the undisputed king of social media, but this does not mean that their subjects are happy. In a January 2013 study, online news site 24/7 Wall St. found Facebook to be one of America's top ten most hated companies. This study factors in customer and employee satisfaction, as well as stock performance.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Productivity Google Computer User Tips Innovation IT Support Smartphones Small Business IT Support Mobile Devices Data Backup VoIP Quick Tips communications Collaboration Network Business Continuity Gadgets Android Microsoft Office Upgrade Social Media Data Recovery Cybersecurity Disaster Recovery Mobile Office Server Communication Smartphone Virtualization Miscellaneous Mobile Device Management Phishing Ransomware Holiday Windows Tech Term Vendor Management Windows 10 Outsourced IT Operating System Passwords Remote Monitoring Managed IT Services Internet of Things Apps Unified Threat Management Facebook Automation Mobile Device BDR Mobile Computing Users Analytics BYOD Remote Computing Data Management Apple Managed IT services Windows 10 WiFi The Internet of Things History Marketing Artificial Intelligence Training Browser Save Money Cloud Computing Firewall Big data Help Desk App Alert Information Technology Encryption Two-factor Authentication Spam IT Consultant Bandwidth Office 365 Business Technology Maintenance Going Green Printer Gmail Government Cybercrime Bring Your Own Device Health Hard Drives Antivirus Access Control Managed IT Windows 7 Office Content Filtering Best Practice Lithium-ion Battery Virus Tech Support Managed Service Recovery Employer-Employee Relationship Hiring/Firing Wireless Technology Retail Search Cost Management Computers Saving Time VPN Information Outlook Windows 8 Healthcare Budget Update Blockchain Humor Data Loss Customer Service IBM Networking Augmented Reality Project Management Money Document Management Phone System Computing Hacking Travel It Management Education iPhone Patch Management Risk Management Wireless Legal Applications Customer Relationship Management Save Time Data Breach File Sharing Storage Website Downtime Hard Drive Regulations PowerPoint Conferencing Mobility Administration SaaS Password Proactive IT Value Current Events Computer Repair Running Cable Law Enforcement Hacker Avoiding Downtime Intranet Solid State Drive Twitter Compliance Data storage Telephone Systems Cryptocurrency Virtual Desktop Social Excel Laptop Scam Business Growth DDoS Business Intelligence Digital Payment Router Paperless Office Digital Google Maps Websites Voice over Internet Protocol Word Comparison Tablet Sports Company Culture Social Engineering Disaster End of Support Monitoring Cortana Hosted Solution Software as a Service Social Networking Robot Meetings Securty Private Cloud Management Wi-Fi Fax Server Cooperation Vulnerabilities Data Security Telephony Machine Learning Flexibility Black Market Vendor User Specifications Safety Distributed Denial of Service Downloads Processor Memory Google Docs Public Cloud Licensing Documents Net Neutrality Experience Monitors Entertainment Redundancy Chrome Cleaning Teamwork Heating/Cooling Smart Devices Identity Theft Professional Services Office Tips Distribution Evernote Gaming Console YouTube Computer Accessories Virtual Assistant Integration Virtual Reality Text Messaging Unified Communications Settings Politics Webcam Automobile eWaste Start Menu Trending Tech Terms Emails Managed Services Provider Mouse Chromebook Mobile Technology User Error Computing Infrastructure Hack Co-managed IT Programming How To IT service Uninterrupted Power Supply Statistics Managed Services Processors Vulnerability Download Inbound Marketing Multi-factor Authentication Network Congestion Telephone Bitcoin USB Managed IT Service Lifestyle Bluetooth Data Protection Presentation Pain Points Microchip Taxes Streaming Media Managing Costs Nanotechnology Social Network Best Practives Work/Life Balance Microsoft 365 Desktop Finance WannaCry IT Product Reviews Reading Samsung Deep Learning Time Management Freedom of Information Read G Suite Visible Light Communication Medical IT Trend Micro Business Cards Service Level Agreement Corporate Profile Employer Employee Relationship Browsers Startup Asset Tracking Assessment SharePoint Development Upselling IT consulting Security Cameras Threats Unified Threat Management Backup and Disaster Recovery Hacks Physical Security User Tip Proactive Maintenance Username Digital Signature Microserver Navigation Virtual Machine Screen Reader Customer Resource management Device Management Tip of the week Banking Botnet Video Surveillance Solutions Gamification Google Calendar Relocation Tablets Get More Done Touchscreen Content Management News Sync Advertising Flash eCommerce Piracy Upload VoIP Business Managemenet Saving ZTime CIO Data Analysis Employees Smart Tech Consultation Video Conferencing Windows XP GDPR Managing Risk Fiber-Optic Database PDF Printer Server Knowledge Notifications CCTV Staffing Google Wallet SQL Server HTML Turn Key Displays Tech Hypervisor Telephone System Trojan online Currency Business Metrics Computer Malfunction Debate Society Mobile Security Best Available Keyboard Technology Tips Communitications Reliable Computing Harddrive Domains Fake News In Internet of Things GPS Holidays Software License Trends Organize Audit Micrsooft Fileless Malware Hybrid Cloud Multi-Factor Security Cost Data Warehousing Modem Strategy Fraud Tactics LinkedIn External Harddrive Drones Proxy Server Azure Devices Public Speaking Term Emergency Hard Drive Disposal Motion Sickness Electronic Medical Records Transportation UTM Content Shortcut Access IT Assessment Scalability Error Troubleshooting Archive Microsoft Excel 3D Ebay Permissions Language Recording Optimization IT Plan Enterprise Resource Planning Entrepreneur Computer Care Skype Messenger Tracking Thin CLient Directions Display Legislation Google Drive Windows Server 2008 SSID How To email scam Addiction Environment Webinar Rental Service Smart Phones Dark Web Free Resource Accountants A.I. HIPAA Cabling switches Writing Processing Electronic Payment Web Server Music Health IT Employee/Employer Relationship Competition Spyware Point of Contact Mobile Payment Electronic Health Records Wireless Headphones Business Owner Administrator Adminstration Pirating Information Logistics Virtual Machines Migration Connected Devices Electricity Printing Memes Books Workers Leadership Upgrades Wasting Time LiFi Cyber security Network Management Supercomputer Bookmark Equifax Fleet Tracking IP Address Analytic Worker Google Play Telephone Service Human Resources Recycling Employer/Employee Relationships Device security MSP Application cache Television Surveillance Financial 3D Printing CrashOverride Printers Managing Stress Capital Regulation Productuvuty Personal Information

toner1