facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Handy Google Chrome Shortcuts

Tip of the Week: Handy Google Chrome Shortcuts

It’s no secret how useful the Google Chrome browser is to a user. What is a secret, however, is that Chrome has some added capabilities that make it even more useful than first impressions would suggest. For our Tip of the Week, we’ll review some of these capabilities so you can implement them into your daily workflows.

0 Comments
Continue reading

Why Protecting Your Google Account Should Be a Priority

Why Protecting Your Google Account Should Be a Priority

Your Google account is one of your most important assets, regardless of whether you’re a business professional or a casual user. The tricky part of using Google, however, is to make sure that you’re using this asset safely. By securing your account and valuing your Google account credentials, you can make sure your account stays safe.

0 Comments
Continue reading

Enhancements Made to Google Maps

Enhancements Made to Google Maps

Google Maps is a neat service that helps users navigate during their travels, but more upgrades are being released all the time to augment their experiences. Some of the most recent updates have provided additional functionality that can provide users with even more ways to use Google Maps--particularly in regard to actually making it to their destination on time and in style.

0 Comments
Continue reading

Chromebooks Deserve More Credit than You Might Think

Chromebooks Deserve More Credit than You Might Think

It can be easy to dismiss the simple Chromebook as a limited solution, a one-trick pony of technology. However, while this may have once been true of the devices, more recent models are capable of much more than their predecessors. We’ll address a few misconceptions people have about, and against, Chromebooks.

0 Comments
Continue reading

Tech Term: Chromebook, Defined

Tech Term: Chromebook, Defined

Chromebooks are becoming more and more popular with the general technology user, and for good reason. They have features that make them quite desirable for a lot of people, but also due to these features, they aren’t for everyone. This week’s Tech Term is the Chromebook, so let’s take a closer look at what they are and what they do.

0 Comments
Continue reading

Tip of the Week: Google Chrome Extensions for Google Drive

Tip of the Week: Google Chrome Extensions for Google Drive

Google Drive lets its users take advantage of a lot of great tools and utilities, and this is only augmented by Google Chrome’s extensions. With these tools at your disposal, you can optimize the way your company takes advantage of Google Drive. Here are some of the best extensions out there that let you utilize Google Drive’s best assets to your advantage.

0 Comments
Continue reading

Tip of the Week: It’s Easy to Color-Code Your Google Drive

Tip of the Week: It’s Easy to Color-Code Your Google Drive

By default, folders in Google Drive display as a muted gray color. Unfortunately, this simplistic choice can make certain folders difficult to find in a sea of gray. For this week’s tip, we’ll go through how to change the color that a folder displays in Google Drive.

0 Comments
Continue reading

Android Starts Zero-Touch With Google Pixel, More To Follow?

Android Starts Zero-Touch With Google Pixel, More To Follow?

Google’s Android line of smart devices have made their presence well-known in the business world. Google now offers a zero-touch enterprise solution for its Pixel-line mobile devices. The primary reason for this is that mobile devices are somewhat time-consuming to set up, especially on the business level. You can save time by pre-configuring these devices for your business to use using Pixel’s zero-touch solution.

0 Comments
Continue reading

Google Instant Is Dead… Did You Notice?

Google Instant Is Dead… Did You Notice?

Users can expect a change to how Google delivers results going forward, as the search engine has killed off its ‘Instant’ feature. This feature--introduced in 2010--influenced how results were displayed, and when.

0 Comments
Continue reading

It's Time to Write a Eulogy for the Internet as We Know It

It's Time to Write a Eulogy for the Internet as We Know It

The Internet is prone to change. We all know this and have experienced it firsthand. Even though we may understand this reality, it can still be rather shocking when we’re confronted with it. The latest statistics show us how the current changes of the Internet have huge implications about how we’ll all interact with the web moving forward, which may spell doom for doing “online business as usual.”

0 Comments
Continue reading

Google Rewards Hackers Handsomely for Exposing Flaws

Google Rewards Hackers Handsomely for Exposing Flaws

Google has implemented a project to encourage assistance in collecting potential vulnerabilities for its Nexus line of mobile devices, with some considerable prizes associated with it.

0 Comments
Continue reading

Tip of the Week: How to Download All of Your Media From Google Photos

Tip of the Week: How to Download All of Your Media From Google Photos

If you use Google Photos to store your videos and photos, chances are that you’ve accumulated plenty of media that you’d be devastated to lose. For this week’s tip, we’ll discuss how you can download all of the media you’ve accumulated for your Google account and store it on a local device.

0 Comments
Continue reading

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

If your employees are given an Android device to use for work, or if they bring in their own as a part of a Bring Your Own Device strategy, you may want to pay special attention to what follows.

0 Comments
Continue reading

Google Condemns Adobe Flash to Online Oblivion

Google Condemns Adobe Flash to Online Oblivion

In the wake of a dangerous zero-day vulnerability found in Adobe Flash, which required that users either uninstall it or update to the latest version, it’s becoming increasingly apparent that the web needs to find a new way to support rich media integration. Now, Google plans on slowly phasing out Flash in its web browser, Google Chrome, and switch to HTML5 as the default rich media player.

0 Comments
Continue reading

Tip of the Week: Creating a New Google Account? Here’s How to Transfer Your Contacts

b2ap3_thumbnail_migrate_contacts_from_google_400.jpgDoes your organization use Google Apps for Business? It’s likely you use Google Contacts to store contacts. It’s an ideal tool for business professionals who are constantly on the move, but the real value that it presents is its instantaneous access to work contacts through Android devices. For this week’s tip, we’ll walk you through how to import and export your Google Contacts to a different Google, Outlook, or Apple account.

0 Comments
Continue reading

Tip of the Week: You Can Now Use Google Docs to Type With Your Voice

b2ap3_thumbnail_speech_to_text_400.jpgGoogle is no stranger to voice-related technology. Android smartphones have long had voice-to-text capabilities. Google Now allows users to search the Internet, set alarms, add calendar entries, activate entertainment, and so much more, all with your voice. Now, you can add editing and writing documents in Google Docs to that list.

0 Comments
Continue reading

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

0 Comments
Continue reading

Thanks to Google, Windows XP is About to Get Even More Risky to Use

b2ap3_thumbnail_google_ends_xp_support_400.jpgIt’s been over a year and a half since Microsoft gave up support on its extremely popular operating system, Windows XP. Without the necessary patches and security updates, Windows XP becomes a hazardous system to run for average users and business professionals. Now, things are about to get worse as Google cuts support for its popular web browser, Google Chrome, for Windows XP and several other older operating systems.

0 Comments
Continue reading

Tip of the Week: 3 Steps to Find Your Email Message in Gmail

b2ap3_thumbnail_search_gmail_400.jpgIf your business uses Gmail as its preferred email client, then you know that it’s a great way to keep communications running smoothly. Sometimes, however, a message might fall through the cracks, and you’ll need to locate it in order to acquire certain information. Gmail has made it easy to locate lost messages with their search feature.

0 Comments
Continue reading

Tip of the Week: Gmail Now Lets You Take Back a Sent Email!

b2ap3_thumbnail_gmail_undo_400.jpgHave you ever felt like you shouldn’t have sent that angry email? Do you second-guess yourself right before sending someone a stern talking-to? With Gmail’s new Undo Send feature, you have the opportunity to take back words that might not have been deserved, or simple mistakes that were meant for someone else. You have to think on your feet, though; the clock is ticking down every second you waste.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Hosted Solutions Malware IT Services Efficiency IT Support Google Small Business User Tips Computer Mobile Devices Smartphones Innovation Quick Tips Business Continuity Gadgets Network Disaster Recovery VoIP Microsoft Office Android Productivity Data Backup Social Media Communication Mobile Office Virtualization Collaboration Smartphone Server Upgrade communications Data Recovery Mobile Device Management Miscellaneous Windows 10 Tech Term Cybersecurity IT Support Ransomware Windows Phishing Unified Threat Management Passwords Remote Monitoring Facebook Operating System Holiday Vendor Management Managed IT services Apps Mobile Computing Analytics BYOD Automation Remote Computing BDR Users WiFi Mobile Device Marketing Data Management The Internet of Things Outsourced IT Internet of Things Apple Firewall History Artificial Intelligence Save Money App Alert Browser Managed IT Services Cloud Computing Encryption Big data IT Consultant Going Green Windows 10 Spam Bring Your Own Device Maintenance Office 365 Printer Antivirus Two-factor Authentication Gmail Bandwidth Health Office Content Filtering Lithium-ion Battery Cybercrime Best Practice Information Technology Windows 8 Outlook Cost Management Help Desk Hiring/Firing Wireless Technology Training Hard Drives Tech Support Budget Search Virus Saving Time Business Technology Managed IT Employer-Employee Relationship Update IBM Hacking Money Document Management Healthcare Access Control Computers It Management VPN Travel Blockchain Education Phone System Recovery Risk Management Networking Augmented Reality Legal Save Time Information PowerPoint Regulations Humor Administration SaaS Running Cable Proactive IT File Sharing Customer Service Hard Drive Law Enforcement Applications Twitter Intranet Managed Service Mobility Website Government iPhone Compliance Data storage Flexibility Scam Black Market Retail Cryptocurrency Word Excel Data Breach Laptop Customer Relationship Management Business Intelligence Password Cortana Business Growth Value Digital Payment Project Management Fax Server Digital Telephony Hacker Websites Router Downtime Management Machine Learning Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Company Culture Sports User Computing Computer Repair Disaster End of Support Social Networking Hosted Solution Social Robot Avoiding Downtime Wireless Data Security Securty Google Maps DDoS Patch Management Solid State Drive Social Engineering Current Events Data Loss Co-managed IT User Error Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Monitoring How To eWaste Google Docs Net Neutrality Evernote Private Cloud Experience Chrome Download Monitors Virtual Assistant Cleaning Lifestyle Gaming Console Office Tips Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Mobile Technology YouTube Text Messaging Distributed Denial of Service USB Webcam Presentation Cooperation Software as a Service Unified Communications Settings Trending Public Cloud Vendor Uninterrupted Power Supply Mouse Specifications Safety Vulnerability Virtual Desktop Statistics Bitcoin Programming Identity Theft Windows 7 IT service Network Congestion Documents Inbound Marketing Data Protection Distribution Entertainment Heating/Cooling Politics Storage Virtual Reality Emails Pain Points Bluetooth Streaming Media Conferencing Automobile Tech Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Integration Software License Trends Motion Sickness Best Available Keyboard Deep Learning Devices Webinar Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Google Calendar UTM Content Rental Service Meetings Public Speaking Modem Upselling Touchscreen News Visible Light Communication Memory Proxy Server VoIP Shortcut Term Consultation IT consulting Legislation Error Cabling Electronic Medical Records Video Surveillance Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Content Management email scam Addiction Wi-Fi Administrator Entrepreneur Directions Saving ZTime Multi-factor Authentication Supercomputer HIPAA SSID Fake News Advertising Flash Environment Dark Web Audit CIO Competition Processing Harddrive Data Warehousing Windows XP Wireless Headphones Telephone Worker Electronic Payment Health IT Debate Staffing Google Wallet online Currency Migration Connected Devices Best Practives Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics GPS Emergency Hard Drive Disposal Society Network Management Managed IT Service LinkedIn Device security MSP Employer Employee Relationship IP Address Microsoft Excel Microserver G Suite Bookmark External Harddrive Computer Care Micrsooft Physical Security Application Google Play Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Human Resources Drones Desktop Finance Hacks Thin CLient Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets Microsoft 365 3D Ebay Archive Business Cards Service Level Agreement Get More Done Banking Botnet Processor Username Printer Server Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Turn Key Sync Browsers Smart Phones Electricity Printing Notifications CCTV Digital Signature Security Cameras Point of Contact Screen Reader Customer Resource management User Tip Gamification Trojan Navigation Leadership cache Television switches Writing Smart Tech Organize Reliable Computing Solutions Adminstration Pirating Information Music Piracy Upload Business Metrics Computer Malfunction Teamwork Upgrades HTML Professional Services Fiber-Optic Database In Internet of Things Data Analysis WannaCry Downloads GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF Corporate Profile Recycling Mobile Security Regulation CrashOverride 3D Printing Transportation Capital Productuvuty Printers Managing Stress

toner1