facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media Pros and Cons

Social Media Pros and Cons

As a technology, social media has been a revelation for individuals and businesses, alike. From a technology management perspective, it also has produced a lot of wasted man-hours over that time. Today, we will look at the pros and cons of social media for the small and medium-sized business, and how to get so the use of it is a net-positive position for your company.

0 Comments
Continue reading

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

0 Comments
Continue reading

Tip of the Week: How to Leverage 2FA on Facebook

Tip of the Week: How to Leverage 2FA on Facebook

If you’re like its over 2.19 billion other active users, Facebook has quite a bit of your personal information stored in it, and the risks that this implies only grow if your business is also represented on the social network. If your account isn’t protected as much as it could be, you could find yourself at risk of identity theft or other crimes. This is why we recommend activating two-factor authentication on Facebook.

0 Comments
Continue reading

Facebook, Gmail, and Slack are Becoming More Collaborative

Facebook, Gmail, and Slack are Becoming More Collaborative

In the modern business setting, collaboration drives productivity. As a result, many software developers are producing software with collaboration in mind. Since these developers are all in competition with each other for market share, they are typically trying to build on more advanced features to outmaneuver the other companies. Some of the biggest names in the industry have recently updated their products to make collaboration a priority. This week we’ll take a look at updates made to Facebook Workplace, Gmail, and Slack.

0 Comments
Continue reading

It's Time to Write a Eulogy for the Internet as We Know It

It's Time to Write a Eulogy for the Internet as We Know It

The Internet is prone to change. We all know this and have experienced it firsthand. Even though we may understand this reality, it can still be rather shocking when we’re confronted with it. The latest statistics show us how the current changes of the Internet have huge implications about how we’ll all interact with the web moving forward, which may spell doom for doing “online business as usual.”

0 Comments
Continue reading

Tip of the Week: 8 Facebook Messenger Features that Business Owners Will Love

Tip of the Week: 8 Facebook Messenger Features that Business Owners Will Love

Back in 2011, Facebook released their Messenger app. It was designed to be a chat system that could be used to communicate outside of the Facebook app. Since then, Facebook has provided Messenger with much more functionality than your average everyday messaging system. In fact, Messenger might now offer features that could be helpful for your business.

0 Comments
Continue reading

Tip of the Week: How to Post to Your Facebook News Feed, But Not Your Timeline

Tip of the Week: How to Post to Your Facebook News Feed, But Not Your Timeline

It’s a typical work day. You’re going about your business, when you decide to take a short break and check Facebook. Maybe you see a post that you’d like to share, but you’d rather not have that post on your timeline. While you could just delete it later, there’s a new feature that lets you share a post to your news feed, without posting it on your timeline.

0 Comments
Continue reading

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

The man who, between 2008 and 2009, stole the log-in credentials of Facebook users to spread his credential-stealing web links, has been sentenced to some hard time.

0 Comments
Continue reading

Tip of the Week: How to Prevent a Certain Facebook Friend From Seeing Your Post

Tip of the Week: How to Prevent a Certain Facebook Friend From Seeing Your Post

What makes Facebook so valuable is that it connects you to a wide variety of people. However, for many users, having such a diverse audience means holding back on sharing their personal opinions, which kind of takes the fun out of social networking. Did you know that Facebook allows you to exclude certain people from seeing your posts? For this week’s tip, we’ll show you how to take advantage of this feature.

0 Comments
Continue reading

Could You Go 99 Days Without Social Media?

b2ap3_thumbnail_lifi_400.jpgEmployees who are addicted to social media is a problem for modern businesses. Despite the professional networking benefits of social media, it can be a major distraction and time-waster. Before you lock down all social media websites on your network, you should first try to understand why humans have such a hard time leaving social media alone.

0 Comments
Continue reading

Tip of the Week: Find Success By Building a Professional Network On Facebook

b2ap3_thumbnail_facebook_networking_for_your_business_400.jpgIt’s a known fact that social media is a great asset for the modern business owner to leverage, but you wouldn’t believe how often it’s misconstrued as a waste of time. In fact, social media outlets like Facebook, Twitter, LinkedIn, and even YouTube, are so commonplace nowadays in the business world that your organization could fall behind others that properly utilize them. Facebook, in particular, is a powerful tool that can be used for online networking purposes.

0 Comments
Continue reading

If You Love Facebook, then You’ll Dig “Facebook at Work”

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has become the most popular social media outlet in the world, but in the eyes of corporate offices, it can be an immense time waster and productivity killer. However, it can be an incredibly efficient tool for connecting with other professionals, sort of like a pseudo-LinkedIn. To counter this stigma associated with social media in the workplace, Facebook has produced Facebook at Work.

0 Comments
Continue reading

Don’t Fall for Fake Facebook Friends

b2ap3_thumbnail_friend400.jpgIt's a trap! As more people subscribe to social media networking sites, we can expect more scammers to weasel their way into our friend bases. Especially when using Facebook, you'll need to be on the look out for scammers. Here are some warning signs of fake Facebook friends to consider in order to keep your profile safe.

0 Comments
Continue reading

Clean Up the Clutter from Your Facebook News Feed

b2ap3_thumbnail_NewsFeed400.jpgIn 2012, Facebook hit one billion active users. Facebook is the undisputed king of social media, but this does not mean that their subjects are happy. In a January 2013 study, online news site 24/7 Wall St. found Facebook to be one of America's top ten most hated companies. This study factors in customer and employee satisfaction, as well as stock performance.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Email Network Security Saving Money Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Smartphones Quick Tips Mobile Devices Innovation User Tips Gadgets Business Continuity Microsoft Office VoIP Disaster Recovery Network Android Social Media Collaboration Mobile Office Virtualization Data Backup Server Productivity Mobile Device Management Communication Smartphone Miscellaneous Data Recovery Windows 10 communications Upgrade Ransomware Tech Term Unified Threat Management IT Support Windows Operating System Passwords Holiday Facebook Remote Monitoring Vendor Management BYOD Remote Computing Cybersecurity Apps Managed IT services Mobile Computing Phishing Automation Users BDR WiFi Marketing Mobile Device Analytics The Internet of Things Outsourced IT Firewall Apple Data Management History Save Money App Internet of Things Alert Artificial Intelligence Managed IT Services Browser IT Consultant Big data Encryption Content Filtering Office Bandwidth Office 365 Going Green Cloud Computing Maintenance Printer Gmail Spam Bring Your Own Device Health Antivirus Business Technology Saving Time Cost Management Outlook Windows 8 Lithium-ion Battery Windows 10 Best Practice Information Technology Managed IT Budget Two-factor Authentication Tech Support Virus Help Desk Wireless Technology Hiring/Firing Search Cybercrime Hard Drives Phone System Blockchain Training Computers VPN Hacking Travel Update IBM Healthcare Access Control Money Document Management Recovery Employer-Employee Relationship Proactive IT Running Cable Managed Service SaaS Intranet Twitter Education Law Enforcement Hard Drive Compliance Mobility Information Data storage Risk Management Humor Augmented Reality Customer Service Save Time PowerPoint Legal Government Networking Website Administration It Management Applications Regulations Telephone Systems Paperless Office Word Computer Repair Current Events Patch Management Sports Social Networking Avoiding Downtime Disaster Value Data Loss Computing Password Cortana Hosted Solution Scam End of Support File Sharing Robot Hacker iPhone Securty Data Breach Fax Server Google Maps Solid State Drive Project Management Digital Excel Websites Social Engineering User Customer Relationship Management Black Market Flexibility Cryptocurrency Social Business Intelligence Wireless Laptop Digital Payment Business Growth DDoS Router Downtime Comparison Tablet Company Culture Data Security Machine Learning Distributed Denial of Service Mouse YouTube Retail Settings eWaste Unified Communications Programming User Error Statistics Inbound Marketing Conferencing Public Cloud Co-managed IT Network Congestion Redundancy Identity Theft Processors Pain Points Monitoring IT service Evernote USB Lifestyle Streaming Media Virtual Reality Politics Presentation Emails Management Automobile Bluetooth Chromebook Virtual Desktop Net Neutrality Start Menu Tech Terms Specifications Safety Vulnerabilities Computing Infrastructure Hack Chrome Mobile Technology Documents Software as a Service Gaming Console Google Docs How To Download Experience Heating/Cooling Uninterrupted Power Supply Cooperation Private Cloud Entertainment Cleaning Computer Accessories Text Messaging Monitors Storage Vendor Webcam Bitcoin Telephony Office Tips Microchip Taxes Trending Data Protection Piracy Upload Society Security Cameras 3D Ebay Smart Tech Reading Distribution Samsung Displays Domains cache User Tip Television Thin CLient Archive Navigation HTML Employer Employee Relationship Micrsooft Public Speaking Skype WannaCry Smart Phones Downloads Fiber-Optic Database G Suite Time Management Data Analysis Freedom of Information Mobile Security Hacks Physical Security Drones Shortcut Corporate Profile Professional Services Telephone System Licensing SharePoint Leadership Software License Banking Trends Botnet Entrepreneur GDPR Adminstration Pirating Information Multi-Factor Security Relocation Cost Tablets Troubleshooting Webinar Point of Contact Assessment Sync Permissions Language Environment Tech Tip of the week Devices HIPAA Google Calendar Fraud Tactics Touchscreen Fileless Malware News UTM Notifications Content CCTV Competition VoIP Voice over Internet Protocol Electronic Payment Consultation Proxy Server IT Plan Business Metrics Enterprise Resource Planning Computer Malfunction Music Recycling Knowledge Modem Legislation Reliable Computing Error switches Writing Business Owner Analytic Addiction In Internet of Things Term Virtual Assistant Accountants A.I. Upgrades IP Address Product Reviews Electronic Medical Records Technology Tips email scam Human Resources Read Directions Upselling Fake News Multi-factor Authentication Best Practives Application Audit Recording LiFi Dark Web Data Warehousing Migration Connected Devices Motion Sickness SSID Video Surveillance Wireless Headphones Scalability Telephone Network Management Work/Life Balance Microserver Device Management Emergency Processing Hard Drive Disposal Equifax Messenger Fleet Tracking Tracking Deep Learning Access Health IT Saving ZTime Content Management Managed IT Service Microsoft Excel Device security Rental Service MSP Meetings Digital Signature Business Managemenet Computer Care Visible Light Communication Memory Google Drive Bookmark Harddrive Windows Server 2008 Desktop Finance Web Server Teamwork Get More Done Debate Nanotechnology Social Network IT consulting Cabling Business Cards Wi-Fi Service Level Agreement Administrator Turn Key online Currency Vulnerability Google Play GPS Startup Books Asset Tracking Workers Printer Server Spyware Mobile Payment PDF Processor Username CIO Supercomputer Trojan Electricity External Harddrive Printing Unified Threat Management Backup and Disaster Recovery Advertising Flash Browsers Windows 7 Gamification Staffing Google Wallet Best Available Keyboard LinkedIn Medical IT Screen Reader Customer Resource management Windows XP Worker Organize Managing Stress Printers Regulation CrashOverride Capital Productuvuty 3D Printing

toner1