facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Protecting Your Google Account Should Be a Priority

Why Protecting Your Google Account Should Be a Priority

Your Google account is one of your most important assets, regardless of whether you’re a business professional or a casual user. The tricky part of using Google, however, is to make sure that you’re using this asset safely. By securing your account and valuing your Google account credentials, you can make sure your account stays safe.

0 Comments
Continue reading

Enhancements Made to Google Maps

Enhancements Made to Google Maps

Google Maps is a neat service that helps users navigate during their travels, but more upgrades are being released all the time to augment their experiences. Some of the most recent updates have provided additional functionality that can provide users with even more ways to use Google Maps--particularly in regard to actually making it to their destination on time and in style.

0 Comments
Continue reading

Chromebooks Deserve More Credit than You Might Think

Chromebooks Deserve More Credit than You Might Think

It can be easy to dismiss the simple Chromebook as a limited solution, a one-trick pony of technology. However, while this may have once been true of the devices, more recent models are capable of much more than their predecessors. We’ll address a few misconceptions people have about, and against, Chromebooks.

0 Comments
Continue reading

Tech Term: Chromebook, Defined

Tech Term: Chromebook, Defined

Chromebooks are becoming more and more popular with the general technology user, and for good reason. They have features that make them quite desirable for a lot of people, but also due to these features, they aren’t for everyone. This week’s Tech Term is the Chromebook, so let’s take a closer look at what they are and what they do.

0 Comments
Continue reading

Tip of the Week: Google Chrome Extensions for Google Drive

Tip of the Week: Google Chrome Extensions for Google Drive

Google Drive lets its users take advantage of a lot of great tools and utilities, and this is only augmented by Google Chrome’s extensions. With these tools at your disposal, you can optimize the way your company takes advantage of Google Drive. Here are some of the best extensions out there that let you utilize Google Drive’s best assets to your advantage.

0 Comments
Continue reading

Tip of the Week: It’s Easy to Color-Code Your Google Drive

Tip of the Week: It’s Easy to Color-Code Your Google Drive

By default, folders in Google Drive display as a muted gray color. Unfortunately, this simplistic choice can make certain folders difficult to find in a sea of gray. For this week’s tip, we’ll go through how to change the color that a folder displays in Google Drive.

0 Comments
Continue reading

Android Starts Zero-Touch With Google Pixel, More To Follow?

Android Starts Zero-Touch With Google Pixel, More To Follow?

Google’s Android line of smart devices have made their presence well-known in the business world. Google now offers a zero-touch enterprise solution for its Pixel-line mobile devices. The primary reason for this is that mobile devices are somewhat time-consuming to set up, especially on the business level. You can save time by pre-configuring these devices for your business to use using Pixel’s zero-touch solution.

0 Comments
Continue reading

Google Instant Is Dead… Did You Notice?

Google Instant Is Dead… Did You Notice?

Users can expect a change to how Google delivers results going forward, as the search engine has killed off its ‘Instant’ feature. This feature--introduced in 2010--influenced how results were displayed, and when.

0 Comments
Continue reading

It's Time to Write a Eulogy for the Internet as We Know It

It's Time to Write a Eulogy for the Internet as We Know It

The Internet is prone to change. We all know this and have experienced it firsthand. Even though we may understand this reality, it can still be rather shocking when we’re confronted with it. The latest statistics show us how the current changes of the Internet have huge implications about how we’ll all interact with the web moving forward, which may spell doom for doing “online business as usual.”

0 Comments
Continue reading

Google Rewards Hackers Handsomely for Exposing Flaws

Google Rewards Hackers Handsomely for Exposing Flaws

Google has implemented a project to encourage assistance in collecting potential vulnerabilities for its Nexus line of mobile devices, with some considerable prizes associated with it.

0 Comments
Continue reading

Tip of the Week: How to Download All of Your Media From Google Photos

Tip of the Week: How to Download All of Your Media From Google Photos

If you use Google Photos to store your videos and photos, chances are that you’ve accumulated plenty of media that you’d be devastated to lose. For this week’s tip, we’ll discuss how you can download all of the media you’ve accumulated for your Google account and store it on a local device.

0 Comments
Continue reading

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

If your employees are given an Android device to use for work, or if they bring in their own as a part of a Bring Your Own Device strategy, you may want to pay special attention to what follows.

0 Comments
Continue reading

Google Condemns Adobe Flash to Online Oblivion

Google Condemns Adobe Flash to Online Oblivion

In the wake of a dangerous zero-day vulnerability found in Adobe Flash, which required that users either uninstall it or update to the latest version, it’s becoming increasingly apparent that the web needs to find a new way to support rich media integration. Now, Google plans on slowly phasing out Flash in its web browser, Google Chrome, and switch to HTML5 as the default rich media player.

0 Comments
Continue reading

Tip of the Week: Creating a New Google Account? Here’s How to Transfer Your Contacts

b2ap3_thumbnail_migrate_contacts_from_google_400.jpgDoes your organization use Google Apps for Business? It’s likely you use Google Contacts to store contacts. It’s an ideal tool for business professionals who are constantly on the move, but the real value that it presents is its instantaneous access to work contacts through Android devices. For this week’s tip, we’ll walk you through how to import and export your Google Contacts to a different Google, Outlook, or Apple account.

0 Comments
Continue reading

Tip of the Week: You Can Now Use Google Docs to Type With Your Voice

b2ap3_thumbnail_speech_to_text_400.jpgGoogle is no stranger to voice-related technology. Android smartphones have long had voice-to-text capabilities. Google Now allows users to search the Internet, set alarms, add calendar entries, activate entertainment, and so much more, all with your voice. Now, you can add editing and writing documents in Google Docs to that list.

0 Comments
Continue reading

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

0 Comments
Continue reading

Thanks to Google, Windows XP is About to Get Even More Risky to Use

b2ap3_thumbnail_google_ends_xp_support_400.jpgIt’s been over a year and a half since Microsoft gave up support on its extremely popular operating system, Windows XP. Without the necessary patches and security updates, Windows XP becomes a hazardous system to run for average users and business professionals. Now, things are about to get worse as Google cuts support for its popular web browser, Google Chrome, for Windows XP and several other older operating systems.

0 Comments
Continue reading

Tip of the Week: 3 Steps to Find Your Email Message in Gmail

b2ap3_thumbnail_search_gmail_400.jpgIf your business uses Gmail as its preferred email client, then you know that it’s a great way to keep communications running smoothly. Sometimes, however, a message might fall through the cracks, and you’ll need to locate it in order to acquire certain information. Gmail has made it easy to locate lost messages with their search feature.

0 Comments
Continue reading

Tip of the Week: Gmail Now Lets You Take Back a Sent Email!

b2ap3_thumbnail_gmail_undo_400.jpgHave you ever felt like you shouldn’t have sent that angry email? Do you second-guess yourself right before sending someone a stern talking-to? With Gmail’s new Undo Send feature, you have the opportunity to take back words that might not have been deserved, or simple mistakes that were meant for someone else. You have to think on your feet, though; the clock is ticking down every second you waste.

0 Comments
Continue reading

5 of the Best Google Easter Eggs You Never Knew Were Real

b2ap3_thumbnail_google_easter_eggs_400.jpgAs the world’s most popular search engine, Google has been known as an innovator for a long time. Google’s worldwide popularity has even turned its name into a verb: “to google,” or to search for something using Google. Despite its rather prestigious reputation, the developers at Google still know how to have a good time, as evidenced by their wide array of hidden Easter eggs.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Smartphones Quick Tips Mobile Devices User Tips Innovation Gadgets Business Continuity Disaster Recovery VoIP Microsoft Office Social Media Android Network Collaboration Productivity Data Backup Mobile Office Virtualization Server Mobile Device Management Communication Smartphone Data Recovery Miscellaneous Upgrade communications Tech Term Ransomware Windows 10 IT Support Unified Threat Management Windows Operating System Holiday Passwords Remote Monitoring Facebook Managed IT services Phishing BYOD Remote Computing Vendor Management Mobile Computing Apps Cybersecurity Users WiFi Automation BDR Data Management Apple Mobile Device Analytics Marketing The Internet of Things History Outsourced IT Firewall Managed IT Services App Alert Artificial Intelligence Browser Internet of Things Save Money Encryption IT Consultant Big data Antivirus Maintenance Printer Office 365 Cloud Computing Health Gmail Office Content Filtering Going Green Bandwidth Bring Your Own Device Spam Hiring/Firing Hard Drives Search Virus Tech Support Saving Time Budget Business Technology Two-factor Authentication Best Practice Information Technology Lithium-ion Battery Windows 10 Cybercrime Training Outlook Windows 8 Managed IT Help Desk Wireless Technology Cost Management Document Management Access Control Computers VPN Blockchain Healthcare Travel Phone System Update Recovery IBM Employer-Employee Relationship Hacking Money Hard Drive Administration Humor Mobility Information Proactive IT Running Cable It Management Networking Legal Intranet Customer Service Regulations iPhone Twitter Education Applications Website SaaS Government Risk Management Managed Service Law Enforcement Augmented Reality Save Time PowerPoint Compliance Data storage File Sharing Hacker Flexibility Comparison Tablet Black Market Company Culture Google Maps Cryptocurrency Laptop Management Computer Repair Social Networking Social Engineering Data Security Business Growth User Avoiding Downtime Patch Management Social Data Loss Scam Wireless Paperless Office Sports DDoS Excel Computing Current Events Data Breach Disaster Machine Learning End of Support Hosted Solution Digital Robot Telephone Systems Project Management Customer Relationship Management Securty Websites Business Intelligence Word Digital Payment Router Value Downtime Password Cortana Solid State Drive Fax Server Uninterrupted Power Supply Trending Vulnerability Processors Google Docs Mouse Virtual Reality Bitcoin USB Politics Presentation Automobile Data Protection Emails Experience Programming Monitors Inbound Marketing Statistics Chromebook Cleaning Vulnerabilities Virtual Desktop Office Tips Specifications Computing Infrastructure Safety Hack Network Congestion How To Private Cloud YouTube Documents Download Pain Points Streaming Media Heating/Cooling Entertainment Redundancy Unified Communications Settings Storage Telephony User Error Cooperation Evernote Co-managed IT Microchip Taxes Net Neutrality Vendor Distributed Denial of Service Chrome Retail IT service Conferencing Public Cloud Start Menu eWaste Tech Terms Gaming Console Mobile Technology Lifestyle Text Messaging Computer Accessories Identity Theft Software as a Service Webcam Bluetooth Monitoring Best Practives HIPAA Google Drive Professional Services Windows Server 2008 External Harddrive Legislation Error Environment Data Analysis Notifications CCTV IT Plan Enterprise Resource Planning Spyware Competition GDPR Reliable Computing Mobile Payment Deep Learning Accountants A.I. LinkedIn Electronic Payment Business Metrics Computer Malfunction Work/Life Balance email scam Addiction 3D Multi-factor Authentication Ebay Business Owner In Internet of Things Visible Light Communication Memory Thin CLient Microserver Electricity Tech Printing Connected Devices Archive IP Address Voice over Internet Protocol Windows 7 IT consulting Smart Phones Wireless Headphones Telephone Skype Fileless Malware Migration cache Application Modem Scalability Television Equifax Fleet Tracking Proxy Server Human Resources Motion Sickness Network Management Get More Done WannaCry Term Messenger Downloads Tracking CIO Adminstration Device security Pirating Information MSP Printer Server Electronic Medical Records Advertising Flash Leadership Turn Key Point of Contact Desktop Finance Trojan Time Management Recording Freedom of Information Windows XP Nanotechnology Social Network Corporate Profile Directions Rental Service Meetings Staffing Google Wallet Digital Signature Assessment SSID SharePoint Cabling Displays Startup Asset Tracking Organize Dark Web Web Server Society Business Cards Service Level Agreement Teamwork Analytic Processing Books Google Calendar Workers Micrsooft Username Recycling Health IT Wi-Fi Administrator Tip of the week Unified Threat Management Backup and Disaster Recovery Drones Gamification Touchscreen News Screen Reader Customer Resource management Product Reviews VoIP Managed IT Service Supercomputer Read Consultation Worker Smart Tech Distribution PDF Bookmark Knowledge Upselling Piracy Upload Best Available Keyboard Google Play Reading Technology Tips Samsung HTML Video Surveillance Webinar Virtual Assistant Permissions Language Fiber-Optic Database Mobile Security Device Management Domains G Suite Fake News Saving ZTime Telephone System Processor Audit Employer Employee Relationship Content Management Public Speaking Medical IT Data Warehousing Licensing switches Writing Multi-Factor Security Cost Business Managemenet Browsers Hacks Physical Security Music Software License Trends Access Shortcut Security Cameras Relocation Tablets Upgrades Devices Debate User Tip Banking Emergency Botnet Hard Drive Disposal Harddrive Fraud Tactics GPS UTM Content online Currency Troubleshooting Sync Microsoft Excel LiFi Entrepreneur Navigation Computer Care Printers 3D Printing CrashOverride Managing Stress Capital Regulation Productuvuty

toner1