facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Minecraft to be the Next Big Programming Educational Tool? [VIDEO]

b2ap3_thumbnail_kids_love_coding_400.jpgIt's back to school time and the battle of getting your kids to play less video games so they can get their homework done begins anew. What if a fun video game can teach your kid a marketable skill like programming? This is the case with the popular video game by Mojang, Minecraft.

Continue reading

4 Xbox One Features for Your Business. Wait. What?

b2ap3_thumbnail_xbox400.jpgIn a recent marketing ploy by Microsoft that is nothing short of genius, the new Xbox One is pitched as a tool that can help your business. The beauty of this strategy is that it allows for businesses to write off the $499 Xbox One as a business expense. Here are four new Xbox One features that allow for this clever budgeting move.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Productivity Efficiency Google Computer User Tips Innovation IT Support Small Business Smartphones Data Backup IT Support Mobile Devices Quick Tips VoIP communications Business Continuity Network Collaboration Gadgets Microsoft Office Data Recovery Android Upgrade Social Media Mobile Office Cybersecurity Server Disaster Recovery Virtualization Smartphone Communication Miscellaneous Mobile Device Management Phishing Holiday Ransomware Windows Vendor Management Passwords Outsourced IT Tech Term Operating System Windows 10 Apps Internet of Things Facebook Managed IT Services Unified Threat Management Remote Monitoring BDR Mobile Device Automation Data Management Analytics BYOD Remote Computing Users Managed IT services Apple Mobile Computing WiFi Windows 10 The Internet of Things History Marketing Artificial Intelligence Training Firewall Browser Cloud Computing Save Money Help Desk Alert App Big data Spam IT Consultant Office 365 Two-factor Authentication Bandwidth Business Technology Office Encryption Information Technology Health Going Green Hard Drives Bring Your Own Device Access Control Antivirus Windows 7 Gmail Managed IT Government Maintenance Cybercrime Printer Content Filtering Cost Management Information Hiring/Firing Healthcare Budget Wireless Technology Computers Outlook Saving Time Windows 8 Search VPN Managed Service Recovery Employer-Employee Relationship Tech Support Retail Virus Best Practice Lithium-ion Battery Hacking Project Management Networking IBM Money Phone System Augmented Reality Document Management Computing Customer Service It Management Travel Blockchain Education Humor Data Loss Update iPhone Legal Save Time Downtime Hacker Regulations Customer Relationship Management Current Events PowerPoint SaaS Computer Repair Running Cable Proactive IT Administration File Sharing Hard Drive Wireless Law Enforcement Applications Intranet Twitter Mobility Storage Website Patch Management Solid State Drive Compliance Conferencing Data storage Avoiding Downtime Risk Management Data Breach Password Value Voice over Internet Protocol Wi-Fi Excel Digital Digital Payment Websites Router Management Telephony Machine Learning Paperless Office Vulnerabilities Telephone Systems Comparison Tablet Software as a Service Company Culture Sports Disaster User Hosted Solution Virtual Desktop End of Support Social Networking Social Robot Cooperation Vendor Fax Server Data Security Securty Google Maps DDoS Social Engineering Scam Black Market Flexibility Cryptocurrency Word Monitoring Laptop Meetings Business Intelligence Private Cloud Cortana Business Growth Smart Devices Virtual Assistant Cleaning Monitors Office Tips Multi-factor Authentication Telephone Processors Start Menu Tech Terms Computer Accessories Microchip Managed Services Provider Taxes Distributed Denial of Service USB Mobile Technology YouTube Gaming Console Unified Communications Settings User Error Trending Co-managed IT Presentation Public Cloud Licensing Uninterrupted Power Supply Mouse Managed Services Specifications Safety Text Messaging Vulnerability Managed IT Service Webcam Bitcoin Programming Identity Theft Statistics IT service Network Congestion Lifestyle Documents Data Protection Distribution Entertainment Processor Teamwork Heating/Cooling Virtual Reality Downloads Politics Bluetooth Streaming Media Automobile Inbound Marketing Emails Chromebook Redundancy Computing Infrastructure Hack Professional Services Memory How To eWaste Google Docs Net Neutrality Pain Points Integration Experience Chrome Download Evernote A.I. Books Holidays Workers Troubleshooting Content Management email scam Addiction Fileless Malware Hybrid Cloud Administrator Trojan Entrepreneur Technology Tips Business Managemenet Accountants Upselling Fake News Advertising Flash Proxy Server Azure Environment Audit CIO Modem Strategy Supercomputer Organize HIPAA Windows XP Wireless Headphones Electronic Medical Records Transportation Worker Electronic Payment Video Surveillance Video Conferencing Staffing Google Wallet online Currency Migration Connected Devices Term Competition Data Warehousing Equifax Fleet Tracking Recording Reading Optimization Samsung Business Owner Communitications Emergency Hard Drive Disposal Society Network Management Directions Display Saving ZTime Access Displays IP Address Microsoft Excel Dark Web Free Resource G Suite Computer Care Micrsooft LinkedIn Device security MSP SSID How To Employer Employee Relationship Windows Server 2008 Nanotechnology Social Network Health IT Employee/Employer Relationship Human Resources Debate Drones Desktop Finance Processing Hacks Physical Security Webinar Application Harddrive Google Drive Startup Asset Tracking Logistics Relocation Virtual Machines Tablets GPS IT Assessment Archive Business Cards Service Level Agreement Banking Wasting Time Botnet Spyware Mobile Payment Skype Permissions Language Unified Threat Management Backup and Disaster Recovery Bookmark Sync External Harddrive Electricity Printing Username Cyber security Point of Contact Screen Reader Customer Resource management Employer/Employee Relationships Gamification Google Play Notifications Telephone Service CCTV Digital Signature Smart Tech Microsoft 365 Reliable Computing 3D Ebay Electronic Health Records Music Piracy Upload Business Metrics Managing Costs Computer Malfunction Thin CLient cache Television switches Writing Memes Fiber-Optic Database Browsers In Internet of Things Best Practives Smart Phones WannaCry Upgrades HTML Medical IT Trend Micro Time Management Freedom of Information LiFi Analytic Telephone System User Tip Proactive Maintenance PDF Corporate Profile Recycling Mobile Security Security Cameras Threats Product Reviews Multi-Factor Security Cost Solutions Scalability Microserver Adminstration Pirating Information Surveillance Software License Trends Navigation Virtual Machine Motion Sickness Best Available Keyboard Leadership Assessment SharePoint Messenger eCommerce Tracking Domains IT Tip of the week Work/Life Balance Read Fraud Tactics Data Analysis Employees Google Calendar Deep Learning Devices Touchscreen News Visible Light Communication SQL Server Get More Done VoIP UTM Content GDPR Rental Service Managing Risk Public Speaking Legislation Error Cabling Turn Key Development Knowledge Device Management IT Plan Enterprise Resource Planning Tech Hypervisor Web Server Printer Server Shortcut Consultation IT consulting Capital Productuvuty Internet Service Provider Personal Information Financial Managing Stress CrashOverride Regulation Printers 3D Printing